{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/ftp/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["buffer-overflow","code-execution","ftp"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eFTP Shell Server version 6.83 is vulnerable to a buffer overflow (CVE-2019-25619). This vulnerability exists within the \u0026lsquo;Account name to ban\u0026rsquo; field, located in the Manage FTP Accounts dialog. A local attacker can exploit this flaw by providing a specially crafted string as the account name. This crafted string allows for shellcode injection, enabling the attacker to overwrite the return address within the application\u0026rsquo;s memory. Successful exploitation allows an attacker to execute arbitrary…\u003c/p\u003e\n","date_modified":"2026-03-23T14:00:00Z","date_published":"2026-03-23T14:00:00Z","id":"/briefs/2026-03-ftp-shell-overflow/","summary":"FTP Shell Server 6.83 contains a buffer overflow vulnerability (CVE-2019-25619) in the 'Account name to ban' field, enabling a local attacker to execute arbitrary code by injecting shellcode through a crafted string in the Manage FTP Accounts dialog.","title":"FTP Shell Server 6.83 Buffer Overflow Vulnerability (CVE-2019-25619)","url":"https://feed.craftedsignal.io/briefs/2026-03-ftp-shell-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Ftp","version":"https://jsonfeed.org/version/1.1"}