{"api_version":"1","generated_at":"2026-04-22T19:15:04+00:00","cve":"CVE-2015-10003","urls":{"html":"https://cve.report/CVE-2015-10003","api":"https://cve.report/api/cve/CVE-2015-10003.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2015-10003","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2015-10003"},"summary":{"title":"CVE-2015-10003","description":"A vulnerability, which was classified as problematic, was found in FileZilla Server up to 0.9.50. This affects an unknown part of the component PORT Handler. The manipulation leads to unintended intermediary. It is possible to initiate the attack remotely. Upgrading to version 0.9.51 is able to address this issue. It is recommended to upgrade the affected component.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2022-07-17 07:15:00","updated_at":"2022-07-25 18:48:00"},"problem_types":["CWE-610"],"metrics":[],"references":[{"url":"https://vuldb.com/?id.97203","name":"https://vuldb.com/?id.97203","refsource":"MISC","tags":[],"title":"CVE-2015-10003 | FileZilla Server PORT confused deputy (BID-74535)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitygalore.com/site3/filezilla_ftp_server_advisory","name":"http://www.securitygalore.com/site3/filezilla_ftp_server_advisory","refsource":"MISC","tags":[],"title":"Filezilla FTP server is vulnerable to FTP PORT bounce attack and PASV connection theft | Amit Klein's security corner","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2015-10003","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-10003","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2015","cve_id":"10003","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"filezilla-project","cpe5":"filezilla_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2015-10003","TITLE":"FileZilla Server PORT confused deputy","REQUESTER":"cna@vuldb.com","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"generator":"vuldb.com","affects":{"vendor":{"vendor_data":[{"vendor_name":"FileZilla","product":{"product_data":[{"product_name":"Server","version":{"version_data":[{"version_value":"0.9.0"},{"version_value":"0.9.1"},{"version_value":"0.9.2"},{"version_value":"0.9.3"},{"version_value":"0.9.4"},{"version_value":"0.9.5"},{"version_value":"0.9.6"},{"version_value":"0.9.7"},{"version_value":"0.9.8"},{"version_value":"0.9.9"},{"version_value":"0.9.10"},{"version_value":"0.9.11"},{"version_value":"0.9.12"},{"version_value":"0.9.13"},{"version_value":"0.9.14"},{"version_value":"0.9.15"},{"version_value":"0.9.16"},{"version_value":"0.9.17"},{"version_value":"0.9.18"},{"version_value":"0.9.19"},{"version_value":"0.9.20"},{"version_value":"0.9.21"},{"version_value":"0.9.22"},{"version_value":"0.9.23"},{"version_value":"0.9.24"},{"version_value":"0.9.25"},{"version_value":"0.9.26"},{"version_value":"0.9.27"},{"version_value":"0.9.28"},{"version_value":"0.9.29"},{"version_value":"0.9.30"},{"version_value":"0.9.31"},{"version_value":"0.9.32"},{"version_value":"0.9.33"},{"version_value":"0.9.34"},{"version_value":"0.9.35"},{"version_value":"0.9.36"},{"version_value":"0.9.37"},{"version_value":"0.9.38"},{"version_value":"0.9.39"},{"version_value":"0.9.40"},{"version_value":"0.9.41"},{"version_value":"0.9.42"},{"version_value":"0.9.43"},{"version_value":"0.9.44"},{"version_value":"0.9.45"},{"version_value":"0.9.46"},{"version_value":"0.9.47"},{"version_value":"0.9.48"},{"version_value":"0.9.49"},{"version_value":"0.9.50"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-441 Unintended Intermediary"}]}]},"description":{"description_data":[{"lang":"eng","value":"A vulnerability, which was classified as problematic, was found in FileZilla Server up to 0.9.50. This affects an unknown part of the component PORT Handler. The manipulation leads to unintended intermediary. It is possible to initiate the attack remotely. Upgrading to version 0.9.51 is able to address this issue. It is recommended to upgrade the affected component."}]},"credit":"Amit Klein","impact":{"cvss":{"version":"3.1","baseScore":"4.3","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}},"references":{"reference_data":[{"url":"http://www.securitygalore.com/site3/filezilla_ftp_server_advisory","refsource":"MISC","name":"http://www.securitygalore.com/site3/filezilla_ftp_server_advisory"},{"url":"https://vuldb.com/?id.97203","refsource":"MISC","name":"https://vuldb.com/?id.97203"}]}},"nvd":{"publishedDate":"2022-07-17 07:15:00","lastModifiedDate":"2022-07-25 18:48:00","problem_types":["CWE-610"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*","versionEndExcluding":"0.9.51","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}