Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-9rmq-pj9r-3khj
SummaryFileZilla Client 3.63.1 contains a DLL hijacking vulnerability that allows attackers to execute malicious code by placing a crafted TextShaping.dll in the application directory. Attackers can generate a reverse shell payload using msfvenom and replace the missing DLL to achieve remote code execution when the application launches.
Aliases
0
alias CVE-2023-53959
Fixed_packages
0
url pkg:deb/debian/filezilla@0?distro=trixie
purl pkg:deb/debian/filezilla@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@0%3Fdistro=trixie
1
url pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.52.2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.63.0-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
purl pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.68.1-1%3Fdistro=trixie
4
url pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
purl pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.69.6-2%3Fdistro=trixie
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53959
reference_id
reference_type
scores
0
value 0.00288
scoring_system epss
scoring_elements 0.52247
published_at 2026-04-11T12:55:00Z
1
value 0.00288
scoring_system epss
scoring_elements 0.52258
published_at 2026-04-18T12:55:00Z
2
value 0.00288
scoring_system epss
scoring_elements 0.52254
published_at 2026-04-16T12:55:00Z
3
value 0.00288
scoring_system epss
scoring_elements 0.52216
published_at 2026-04-13T12:55:00Z
4
value 0.00288
scoring_system epss
scoring_elements 0.52231
published_at 2026-04-12T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52692
published_at 2026-04-02T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52719
published_at 2026-04-04T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52684
published_at 2026-04-07T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52734
published_at 2026-04-08T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.52729
published_at 2026-04-09T12:55:00Z
10
value 0.00372
scoring_system epss
scoring_elements 0.58976
published_at 2026-04-21T12:55:00Z
11
value 0.00372
scoring_system epss
scoring_elements 0.58958
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53959
1
reference_url https://www.exploit-db.com/exploits/51267
reference_id 51267
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-19T21:28:39Z/
url https://www.exploit-db.com/exploits/51267
2
reference_url https://www.vulncheck.com/advisories/filezilla-client-dll-hijacking-via-missing-textshapingdll
reference_id filezilla-client-dll-hijacking-via-missing-textshapingdll
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-19T21:28:39Z/
url https://www.vulncheck.com/advisories/filezilla-client-dll-hijacking-via-missing-textshapingdll
3
reference_url https://filezilla-project.org/
reference_id filezilla-project.org
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-19T21:28:39Z/
url https://filezilla-project.org/
Weaknesses
0
cwe_id 427
name Uncontrolled Search Path Element
description The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Exploits
Severity_range_score8.5 - 9.8
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-9rmq-pj9r-3khj