Search for vulnerabilities
Vulnerability details: VCID-dgh8-48d1-aaaq
Vulnerability ID VCID-dgh8-48d1-aaaq
Aliases CVE-2011-4130
Summary Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
Status Published
Exploitability 0.5
Weighted Severity 8.1
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.01032 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01612 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01612 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01612 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01612 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01612 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01612 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01612 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01612 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01762 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01762 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01762 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01762 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01895 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
epss 0.01943 https://api.first.org/data/v1/epss?cve=CVE-2011-4130
cvssv2 9.0 https://nvd.nist.gov/vuln/detail/CVE-2011-4130
Reference id Reference type URL
http://bugs.proftpd.org/show_bug.cgi?id=3711
https://api.first.org/data/v1/epss?cve=CVE-2011-4130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4130
http://www.proftpd.org/docs/NEWS-1.3.3g
http://www.securityfocus.com/bid/50631
http://www.zerodayinitiative.com/advisories/ZDI-11-328/
648373 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=648373
cpe:2.3:a:proftpd:proftpd:1.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.0:pre10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.0:pre10:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.0:pre9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.0:pre9:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.10:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.10:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.10:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.10:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.10:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.10:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.2:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.2:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.2:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.2:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.2:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.2:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.5:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.5:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.5:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.5:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.5:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.5:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.6:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.6:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.6:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.6:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.7:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.7:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.7:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.7:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.7:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.7:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.8:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.8:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.8:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.8:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.9:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.9:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.9:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.9:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.9:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.2.9:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:a:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.0:a:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.0:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.0:rc4:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:rc5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.0:rc5:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.1:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.1:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.1:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.1:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.1:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.1:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.2:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.2:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.2:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.2:rc4:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:a:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.3:a:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:b:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.3:b:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:c:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.3:c:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:d:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.3:d:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:e:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.3:e:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.3:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.3:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.3:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.3:rc4:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:*:f:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:*:f:*:*:*:*:*:*
CVE-2011-4130 https://nvd.nist.gov/vuln/detail/CVE-2011-4130
GLSA-201309-15 https://security.gentoo.org/glsa/201309-15
No exploits are available.
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2011-4130
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.63762
EPSS Score 0.01032
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.