cvelist/2011/4xxx/CVE-2011-4130.json

77 lines
2.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 04:52:18 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4130",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 04:52:18 +00:00
"lang": "eng",
"value": "Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer."
2017-10-16 12:31:07 -04:00
}
2019-03-18 04:52:18 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugs.proftpd.org/show_bug.cgi?id=3711",
"refsource": "CONFIRM",
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3711"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-328/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-328/"
},
{
"name": "http://www.proftpd.org/docs/NEWS-1.3.3g",
"refsource": "CONFIRM",
"url": "http://www.proftpd.org/docs/NEWS-1.3.3g"
},
{
"name": "50631",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50631"
}
]
}
}