{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2021-47791","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-01-14T14:39:44.738Z","datePublished":"2026-01-15T23:25:41.916Z","dateUpdated":"2026-01-16T21:12:08.424Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-01-15T23:25:41.916Z"},"datePublic":"2021-09-05T00:00:00.000Z","title":"SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service","descriptions":[{"lang":"en","value":"SmartFTP Client 10.0.2909.0 contains multiple denial of service vulnerabilities that allow attackers to crash the application through specific input manipulation. Attackers can trigger crashes by entering malformed paths, using invalid IP addresses, or clearing connection history in the client's interface."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Allocation of Resources Without Limits or Throttling","cweId":"CWE-770","type":"CWE"}]}],"affected":[{"vendor":"Smartftp","product":"SmartFTP Client","versions":[{"version":"10.0.2909.0 (32 and 64 bit)","status":"affected"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":4.6,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"ACTIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"LOW","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.exploit-db.com/exploits/50266","name":"ExploitDB-50266","tags":["exploit"]},{"url":"https://www.smartftp.com/en-us/","name":"SmartFTP Official Homepage","tags":["product"]},{"url":"https://www.smartftp.com/en-us/download","name":"SmartFTP Download Page","tags":["product"]},{"name":"VulnCheck Advisory: SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/smartftp-client-multiple-denial-of-service"}],"credits":[{"lang":"en","value":"Eric Salario","type":"finder"}],"x_generator":{"engine":"vulncheck"}},"adp":[{"references":[{"url":"https://www.exploit-db.com/exploits/50266","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-16T15:53:00.622975Z","id":"CVE-2021-47791","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-16T21:12:08.424Z"}}]}}