Vulnerability Name: | CVE-2022-29620 | ||||||||||||
Assigned: | 2022-06-07 | ||||||||||||
Published: | 2022-06-07 | ||||||||||||
Updated: | 2022-11-09 | ||||||||||||
Summary: | ** DISPUTED ** FileZilla v3.59.0 allows attackers to obtain cleartext passwords of connected SSH or FTP servers via a memory dump.- Note: the vendor does not consider this a vulnerability. | ||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-312 | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-29620 Source: MISC Type: Exploit, Third Party Advisory https://whichbuffer.medium.com/filezilla-client-cleartext-storage-of-sensitive-information-in-memory-vulnerability-83958c1e1643 Source: MISC Type: Exploit, Third Party Advisory https://youtu.be/ErZl1i7McHk Source: MISC Type: Broken Link https://youtu.be/eSlfQQytIq0 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |