CVE-2019-25587

Published: Mar 22, 2026 Last Modified: Mar 22, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,9
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM 6,2
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none

Description

AI Translation Available

BulletProof FTP Server 2019.0.0.50 contains a denial of service vulnerability in the Storage-Path configuration parameter that allows local attackers to crash the application by supplying an excessively long string value. Attackers can enable the Override Storage-Path setting and paste a buffer of 500 bytes or more to trigger an application crash when saving the configuration.

1282

Assumed-Immutable Data is Stored in Writable Memory

Incomplete
Common Consequences
Security Scopes Affected:
Integrity
Potential Impacts:
Varies By Context
Applicable Platforms
All platforms may be affected
View CWE Details
http://bpftpserver.com/
http://bpftpserver.com/products/bpftpserver/windows/download
https://www.exploit-db.com/exploits/46876
https://www.vulncheck.com/advisories/bulletproof-ftp-server-storage-path-denial…