CVE-2022-29620

FileZilla v3.59.0 allows attackers to obtain cleartext passwords of connected SSH or FTP servers via a memory dump.- NOTE: the vendor does not consider this a vulnerability
Configurations

Configuration 1 (hide)

cpe:2.3:a:filezilla-project:filezilla_client:3.59.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:59

Type Values Removed Values Added
References () https://whichbuffer.medium.com/filezilla-client-cleartext-storage-of-sensitive-information-in-memory-vulnerability-83958c1e1643 - Exploit, Third Party Advisory () https://whichbuffer.medium.com/filezilla-client-cleartext-storage-of-sensitive-information-in-memory-vulnerability-83958c1e1643 - Exploit, Third Party Advisory
References () https://youtu.be/ErZl1i7McHk - Exploit, Third Party Advisory () https://youtu.be/ErZl1i7McHk - Exploit, Third Party Advisory
References () https://youtu.be/eSlfQQytIq0 - Broken Link () https://youtu.be/eSlfQQytIq0 - Broken Link

07 Nov 2023, 03:46

Type Values Removed Values Added
Summary ** DISPUTED ** FileZilla v3.59.0 allows attackers to obtain cleartext passwords of connected SSH or FTP servers via a memory dump.- NOTE: the vendor does not consider this a vulnerability. FileZilla v3.59.0 allows attackers to obtain cleartext passwords of connected SSH or FTP servers via a memory dump.- NOTE: the vendor does not consider this a vulnerability

Information

Published : 2022-06-07 21:15

Updated : 2024-11-21 06:59


NVD link : CVE-2022-29620

Mitre link : CVE-2022-29620

CVE.ORG link : CVE-2022-29620


JSON object : View

Products Affected

filezilla-project

  • filezilla_client
CWE
CWE-312

Cleartext Storage of Sensitive Information