Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-bdvq-4nsk-k7af
SummaryMultiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information.
Aliases
0
alias CVE-2007-0315
Fixed_packages
0
url pkg:deb/debian/filezilla@0?distro=trixie
purl pkg:deb/debian/filezilla@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@0%3Fdistro=trixie
1
url pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.52.2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.63.0-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
purl pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.68.1-1%3Fdistro=trixie
4
url pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
purl pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.69.6-2%3Fdistro=trixie
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0315
reference_id
reference_type
scores
0
value 0.02986
scoring_system epss
scoring_elements 0.8657
published_at 2026-04-24T12:55:00Z
1
value 0.02986
scoring_system epss
scoring_elements 0.86474
published_at 2026-04-01T12:55:00Z
2
value 0.02986
scoring_system epss
scoring_elements 0.86484
published_at 2026-04-02T12:55:00Z
3
value 0.02986
scoring_system epss
scoring_elements 0.86503
published_at 2026-04-04T12:55:00Z
4
value 0.02986
scoring_system epss
scoring_elements 0.86502
published_at 2026-04-07T12:55:00Z
5
value 0.02986
scoring_system epss
scoring_elements 0.86522
published_at 2026-04-08T12:55:00Z
6
value 0.02986
scoring_system epss
scoring_elements 0.86532
published_at 2026-04-09T12:55:00Z
7
value 0.02986
scoring_system epss
scoring_elements 0.86547
published_at 2026-04-11T12:55:00Z
8
value 0.02986
scoring_system epss
scoring_elements 0.86543
published_at 2026-04-12T12:55:00Z
9
value 0.02986
scoring_system epss
scoring_elements 0.86538
published_at 2026-04-13T12:55:00Z
10
value 0.02986
scoring_system epss
scoring_elements 0.86552
published_at 2026-04-16T12:55:00Z
11
value 0.02986
scoring_system epss
scoring_elements 0.86558
published_at 2026-04-18T12:55:00Z
12
value 0.02986
scoring_system epss
scoring_elements 0.86551
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0315
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31500
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31500
2
reference_url http://sourceforge.net/project/shownotes.php?release_id=475423&group_id=21558
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=475423&group_id=21558
3
reference_url http://www.securityfocus.com/bid/22057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22057
4
reference_url http://www.vupen.com/english/advisories/2007/0183
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0183
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:0.9.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.20:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:0.9.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.21:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:0.9.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.22:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.22:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.23:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.24:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.25:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.26:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.26a:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.27:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.28:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.29:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0315
reference_id CVE-2007-0315
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0315
Weaknesses
0
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
Severity_range_score9.3 - 9.3
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-bdvq-4nsk-k7af