Unrated severityNVD Advisory· Published Dec 30, 2008· Updated Apr 23, 2026
CVE-2008-5753
CVE-2008-5753
Description
Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.
Affected products
1- cpe:2.3:a:bpftp:bulletproof_ftp_client:2.63:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-Overflow.htmlnvdExploit
- www.securityfocus.com/bid/33007nvdExploit
- www.kb.cert.org/vuls/id/565580nvdThird Party AdvisoryUS Government Resource
- osvdb.org/50968nvd
- secunia.com/advisories/33322nvd
- securityreason.com/securityalert/4835nvd
- www.exploit-db.com/exploits/37056/nvd
- www.exploit-db.com/exploits/7571nvd
News mentions
0No linked articles in our index yet.