cpe:/a:bpftp:bulletproof_ftp_client:2.63 CVE-2008-5753 2008-12-30T12:30:00.233-05:00 2017-09-28T21:32:47.137-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2016-03-31T12:25:52.557-04:00 ALLOWS_ADMIN_ACCESS BID 33007 SECUNIA 33322 EXPLOIT-DB 37056 SREASON 4835 OSVDB 50968 EXPLOIT-DB 7571 CERT-VN VU#565580 MISC http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-Overflow.html Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.