Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 09 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filezilla-project filezilla Client
|
|
| CPEs | cpe:2.3:a:filezilla-project:filezilla_client:3.40.0:-:*:*:*:*:*:* | |
| Vendors & Products |
Filezilla-project filezilla Client
|
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filezilla-project filezilla
|
|
| Vendors & Products |
Filezilla-project filezilla
|
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FileZilla 3.40.0 contains a denial of service vulnerability in the local search functionality that allows local attackers to crash the application by supplying a malformed path string. Attackers can trigger the crash by entering a crafted path containing 384 'A' characters followed by 'BBBB' and 'CCCC' sequences in the search directory field and initiating a local search operation. | |
| Title | FileZilla 3.40.0 Denial of Service via Local Search | |
| First Time appeared |
Filezilla-project
Filezilla-project filezilla Server |
|
| Weaknesses | CWE-532 | |
| CPEs | cpe:2.3:a:filezilla-project:filezilla_server:3.40.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Filezilla-project
Filezilla-project filezilla Server |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-06T18:12:56.747Z
Reserved: 2026-04-05T15:16:49.556Z
Link: CVE-2019-25683
Updated: 2026-04-06T18:12:49.998Z
Status : Analyzed
Published: 2026-04-05T21:16:46.800
Modified: 2026-04-09T19:17:49.647
Link: CVE-2019-25683
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:45:20Z