{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/159641?format=json","vulnerability_id":"VCID-3c23-m939-wycb","summary":"A vulnerability has been found in FileZilla Client 3.17.0.0 and classified as problematic. This vulnerability affects unknown code of the file C:\\Program Files\\FileZilla FTP Client\\uninstall.exe of the component Installer. The manipulation leads to unquoted search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.","aliases":[{"alias":"CVE-2016-15003"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582979?format=json","purl":"pkg:deb/debian/filezilla@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582182?format=json","purl":"pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-24cg-zw49-b3ab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.52.2-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582183?format=json","purl":"pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-24cg-zw49-b3ab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.63.0-1%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582185?format=json","purl":"pkg:deb/debian/filezilla@3.68.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.68.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582186?format=json","purl":"pkg:deb/debian/filezilla@3.69.6-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.69.6-2%3Fdistro=trixie"}],"affected_packages":[],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-15003","reference_id":"","reference_type":"","scores":[{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62904","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62889","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62869","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.6289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62905","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62737","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62825","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62789","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.6284","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62857","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62863","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62841","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-15003"},{"reference_url":"https://www.exploit-db.com/exploits/39803/","reference_id":"39803","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:05:18Z/"}],"url":"https://www.exploit-db.com/exploits/39803/"},{"reference_url":"https://vuldb.com/?id.97204","reference_id":"?id.97204","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:05:18Z/"}],"url":"https://vuldb.com/?id.97204"},{"reference_url":"https://youtu.be/r06VwwJ9J4M","reference_id":"r06VwwJ9J4M","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:05:18Z/"}],"url":"https://youtu.be/r06VwwJ9J4M"}],"weaknesses":[{"cwe_id":428,"name":"Unquoted Search Path or Element","description":"The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path."}],"exploits":[],"severity_range_score":"6.3 - 6.3","exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3c23-m939-wycb"}