![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2008-5753 |
Description: | Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar. |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-5753 BugTraq ID: 33007 http://www.securityfocus.com/bid/33007 CERT/CC vulnerability note: VU#565580 http://www.kb.cert.org/vuls/id/565580 https://www.exploit-db.com/exploits/37056/ https://www.exploit-db.com/exploits/7571 http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-Overflow.html http://osvdb.org/50968 http://secunia.com/advisories/33322 http://securityreason.com/securityalert/4835 |