FileZilla-project FileZilla Server 0.9.42

CPE Details

FileZilla-project FileZilla Server 0.9.42
0.9.42
2020-07-28 09:23 +00:00
2020-07-28 09:23 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:filezilla-project:filezilla_server:0.9.42:*:*:*:*:*:*:*

Informations

Vendor

filezilla-project

Product

filezilla_server

Version

0.9.42

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2015-10003 2022-07-17 04:35 +00:00 A vulnerability, which was classified as problematic, was found in FileZilla Server up to 0.9.50. This affects an unknown part of the component PORT Handler. The manipulation leads to unintended intermediary. It is possible to initiate the attack remotely. Upgrading to version 0.9.51 is able to address this issue. It is recommended to upgrade the affected component.
4.3
MEDIUM
CVE-2014-0224 2014-06-05 19:00 +00:00 OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
7.4
HIGH
CVE-2014-0160 2014-04-06 22:00 +00:00 The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
7.5
HIGH
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.