CVE-2008-5753

BulletProof FTP Client <2.63 - Buffer Overflow

Title source: llm
STIX 2.1

Description

Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.

Exploits (2)

exploitdb WORKING POC VERIFIED
by His0k4 · pythondoswindows
https://www.exploit-db.com/exploits/7571
exploitdb WORKING POC
by Gabor Seljan · pythonlocalwindows
https://www.exploit-db.com/exploits/37056

References (8)

Core 8
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7571
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/50968
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33322
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/33007
Third Party Advisory, US Government Resource third-party-advisory x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/565580
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/37056/
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/4835

Scores

EPSS 0.2778
EPSS Percentile 96.5%

Details

CWE
CWE-119
Status published
Products (1)
bpftp/bulletproof_ftp_client 2.63
Published Dec 30, 2008
Tracked Since Feb 18, 2026