Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 19 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FileZilla Client 3.63.1 contains a DLL hijacking vulnerability that allows attackers to execute malicious code by placing a crafted TextShaping.dll in the application directory. Attackers can generate a reverse shell payload using msfvenom and replace the missing DLL to achieve remote code execution when the application launches. | |
| Title | FileZilla Client 3.63.1 DLL Hijacking via Missing TextShaping.dll | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-19T21:29:14.660Z
Reserved: 2025-12-19T14:03:57.724Z
Link: CVE-2023-53959
Updated: 2025-12-19T21:28:56.596Z
Status : Received
Published: 2025-12-19T21:15:53.030
Modified: 2025-12-19T21:15:53.030
Link: CVE-2023-53959
No data.
OpenCVE Enrichment
No data.