No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zftp
Zftp zftp Client |
|
| Vendors & Products |
Zftp
Zftp zftp Client |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | zFTP Client 20061220+dfsg3-4.1 contains a buffer overflow vulnerability in the NAME parameter handling of FTP connections that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized NAME value exceeding the 80-byte buffer allocated in strcpy_chk to overwrite the instruction pointer and execute shellcode with user privileges. | |
| Title | zFTP Client 20061220+dfsg3-4.1 Local Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-01T13:58:58.638Z
Reserved: 2026-03-28T11:39:30.497Z
Link: CVE-2016-20046
Updated: 2026-04-01T13:58:44.187Z
Status : Awaiting Analysis
Published: 2026-03-28T12:16:00.827
Modified: 2026-03-30T13:26:07.647
Link: CVE-2016-20046
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:59:19Z