cve-2011-3171
Vulnerability from cvelistv5
Published
2011-11-04 21:00
Modified
2024-08-06 23:22
Severity ?
Summary
Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:22:27.748Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49541",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/49541"
          },
          {
            "name": "SUSE-SU-2011:1028",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00015.html"
          },
          {
            "name": "pureftpd-oes-directory-traversal(69686)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69686"
          },
          {
            "name": "SUSE-SU-2011:1029",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00016.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-09-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "49541",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/49541"
        },
        {
          "name": "SUSE-SU-2011:1028",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00015.html"
        },
        {
          "name": "pureftpd-oes-directory-traversal(69686)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69686"
        },
        {
          "name": "SUSE-SU-2011:1029",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00016.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-3171",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "49541",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/49541"
            },
            {
              "name": "SUSE-SU-2011:1028",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00015.html"
            },
            {
              "name": "pureftpd-oes-directory-traversal(69686)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69686"
            },
            {
              "name": "SUSE-SU-2011:1029",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00016.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-3171",
    "datePublished": "2011-11-04T21:00:00",
    "dateReserved": "2011-08-19T00:00:00",
    "dateUpdated": "2024-08-06T23:22:27.748Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.0.22\", \"matchCriteriaId\": \"D5EC9019-1B5F-433E-8BD4-E9AAAAB902A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BAA8918-A2CB-47A3-BEA5-012202416E2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7AC08B4-58AC-415A-9B66-40A1E3CCD0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.92:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"109D76F0-FB16-4DB5-8CD9-5FC4B7A888F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.93:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D21A2797-A1E1-41D1-A4F9-88A6BDB39386\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.94:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6F60D6F-5EED-4F98-B837-8DA704AE655E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.95:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6FB0AE1-D1C1-49BA-92EB-22610F805C24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD46FE70-94F7-49A8-8C89-7D49D660A3B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre2:*:*:*:*:*:*\", \"matchCriteriaId\": \"63769E2B-D1EA-4A63-87C9-74791641C2A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C656D161-2438-4ACA-AB14-2A9D86509870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre4:*:*:*:*:*:*\", \"matchCriteriaId\": \"05B9AB24-3961-4BEF-A60E-99FE716DF9A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.95.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75803E7D-E4C4-429A-831D-E9BD35D3822F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.95.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AF6AB58-64E1-4B6E-BE3A-F1EF3A4D6D25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.96:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEE4E7D4-64C3-401D-88BD-25480BB0353E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.96:pre1:*:*:*:*:*:*\", \"matchCriteriaId\": \"68510DBF-72AE-468B-8105-69B6A57A04F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.96.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DE75C61-AEB4-49FF-92F0-59BE2DC235A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre1:*:*:*:*:*:*\", \"matchCriteriaId\": \"55A5149F-EFD9-47A6-9E0A-5CC527F692C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1457138A-4081-455B-B5BA-28D7CC14EC6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre3:*:*:*:*:*:*\", \"matchCriteriaId\": \"840635FC-4FDB-4198-A79B-792B643A9388\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre4:*:*:*:*:*:*\", \"matchCriteriaId\": \"82E5881B-7BCE-47A9-883E-0F5B9D223F81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre5:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED101A1B-A785-4F81-9C94-DB4F12BAA088\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97-final:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1664490B-CA34-44A3-8EEC-71A07799E870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C151E6E5-AC14-4C12-B1E4-4FDED6F5CF33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC7E10AE-9B98-4801-91CD-F6EEC75B9C0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFF21C85-76FC-463C-8661-60BE2D3CAC10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21110017-470F-4C38-B09F-8DF94E48EFE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BA24CD0-22DA-4689-981D-88FAA7FCC1C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1931478E-A672-4CF6-9BDC-B3C73B7DA5A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71C4863E-76DA-4E38-B2C7-B30037633030\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E60DE27-EE96-44D1-9469-ACB4EB03CCBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2059AE45-9F9C-4D26-B53A-E61576EBF163\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre3:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BD78C76-3679-47DD-B9A9-CDA0B34EEDEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98:final:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AC69E38-9872-460F-841B-BBE1110FC1B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F812030-6DC3-4A8C-824F-3185AC4F0619\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1917ECFC-BCD2-464C-B4C7-6D87A3B50DC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57A8D91C-EEEB-4F76-8010-2CB174A9B091\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1831F7D-7366-4775-9B70-832F3BAB23E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:a:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE763375-34A0-4D2D-BEC2-D9F9232A1D01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"962C592B-1B02-49EE-9C82-2EA1B0F0F4DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA327868-1A00-4BFE-AB29-3DBE57545EBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09575AA6-7F8C-4A9C-B781-C892B00C3035\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3810E39-63C2-486A-9FFC-C7BBC6DCD455\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.98.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07E6BD24-3843-479E-9DD0-56C69F8A0B71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41E823CA-D59A-404F-A064-25F557BEBD5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99:a:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4C84C4B-3133-4589-B17E-903F78086A3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99:b:*:*:*:*:*:*\", \"matchCriteriaId\": \"366DE55B-E2FC-4CA1-B35C-1F09942A31A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1B51DC2-7C58-4073-B352-02A0B56D447E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre2:*:*:*:*:*:*\", \"matchCriteriaId\": \"209642A4-56B7-4345-B09D-57636A3D221F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD057E44-D7B8-414C-A21D-DEC8753F0C50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:a:*:*:*:*:*:*\", \"matchCriteriaId\": \"79BC687A-A16D-4923-B592-549E12272045\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:b:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C400CA8-7CE1-4E6D-ABAD-102E4BD12C6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D968FE34-54C4-4C06-8EB7-0537EDAAD6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:a:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C6966F1-F1F5-45F6-B446-8408EB1DE9FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CAD1DE8-7D55-4C0B-B691-E8D8AA6E2689\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70576B73-12AF-463B-96AB-18725ACDECFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:0.99.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39F6EBD8-4BFD-49FC-A087-8698DB462880\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3737B53D-E0BC-430F-9B00-5F13C15E3EF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF48827A-8F95-4D07-BB35-AD43A048072B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10DB2640-6C1B-4B95-998C-3737809C9E40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A4B5B69-85CF-40C8-BC79-C340A6445F8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8992045B-1EC7-4254-966E-AECDAEFD950E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14C4E0E1-FC73-4641-A7AC-47E25EAE251B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF00DCF7-A5B8-4B62-9F4F-EB2273589215\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"947E46FD-1B9D-4F64-8C10-FF332796CFE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B72E9F25-975E-4609-A741-F472CEB53265\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D76E5AE-B1D2-4362-915A-A6C15225F772\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD6BC5DF-3A1E-4B1F-87E9-857AE413841C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3928B3DD-CA7E-4204-A49A-7B6E1F973B47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"091BB6EB-7263-4DD2-8B57-B1FF73D61B7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.13:a:*:*:*:*:*:*\", \"matchCriteriaId\": \"C462D2DB-B831-4395-A697-412AF5269E9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C705AE7A-8F8B-49C1-BEA4-B1486AAE9E2C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0AB8F16-5A30-4D85-A3E0-E8EECD5EEA69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:a:*:*:*:*:*:*\", \"matchCriteriaId\": \"893F2C07-21F3-4B1E-B295-6B4DD20B97B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:b:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6F4CFB6-9BD7-467E-ACDD-879D782DD2A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:c:*:*:*:*:*:*\", \"matchCriteriaId\": \"E10A65F7-517F-4966-B83F-7323C8ADA70C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B76D15CD-FECF-435F-A7E4-54FE53638C1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:a:*:*:*:*:*:*\", \"matchCriteriaId\": \"F621BF1C-B9F1-4055-B5D8-6FC70BB3A6D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8669B8EC-482D-44CD-B30E-7D83423E1BC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B67A0244-D65F-4CCE-A084-31AD9A3D9B8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFD2D751-2B85-428E-8766-36F92B338C5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pureftpd:pure-ftpd:1.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"579ECF9F-EBED-49BC-A804-86C71554D06C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0545634-EC4A-48E8-AB3D-49802FB11758\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"60FBDD82-691C-4D9D-B71B-F9AFF6931B53\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"25CBACD3-AFB7-410D-927F-0C1FF477D396\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A53FF936-C785-4CEF-BAD0-3C3EB90EE466\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE26596F-F10E-44EF-88CA-0080646E91B9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:vmware:*:*:*:*:*\", \"matchCriteriaId\": \"B654E601-9B41-416B-9619-A60E6151EC68\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de salto de directorio en Pure-ftpd v1.0.22 y posiblemente en otras versiones, cuando se ejecutan en SUSE Linux Enterprise Server y posiblemente otros sistemas operativos y cuando la funci\\u00f3n de servidor remoto Netware OES est\\u00e1 activada, permite a usuarios locales sobreescribir ficheros arbitrarios a trav\\u00e9s de vectores desconocidos.\"}]",
      "id": "CVE-2011-3171",
      "lastModified": "2024-11-21T01:29:53.840",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:P/A:P\", \"baseScore\": 3.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2011-11-04T21:55:02.550",
      "references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00015.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00016.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/49541\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/69686\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00015.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/49541\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/69686\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-3171\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-11-04T21:55:02.550\",\"lastModified\":\"2024-11-21T01:29:53.840\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de salto de directorio en Pure-ftpd v1.0.22 y posiblemente en otras versiones, cuando se ejecutan en SUSE Linux Enterprise Server y posiblemente otros sistemas operativos y cuando la funci\u00f3n de servidor remoto Netware OES est\u00e1 activada, permite a usuarios locales sobreescribir ficheros arbitrarios a trav\u00e9s de vectores desconocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:P/A:P\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.22\",\"matchCriteriaId\":\"D5EC9019-1B5F-433E-8BD4-E9AAAAB902A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAA8918-A2CB-47A3-BEA5-012202416E2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7AC08B4-58AC-415A-9B66-40A1E3CCD0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109D76F0-FB16-4DB5-8CD9-5FC4B7A888F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D21A2797-A1E1-41D1-A4F9-88A6BDB39386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.94:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F60D6F-5EED-4F98-B837-8DA704AE655E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6FB0AE1-D1C1-49BA-92EB-22610F805C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD46FE70-94F7-49A8-8C89-7D49D660A3B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"63769E2B-D1EA-4A63-87C9-74791641C2A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C656D161-2438-4ACA-AB14-2A9D86509870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"05B9AB24-3961-4BEF-A60E-99FE716DF9A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.95.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75803E7D-E4C4-429A-831D-E9BD35D3822F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.95.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AF6AB58-64E1-4B6E-BE3A-F1EF3A4D6D25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE4E7D4-64C3-401D-88BD-25480BB0353E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.96:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"68510DBF-72AE-468B-8105-69B6A57A04F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.96.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DE75C61-AEB4-49FF-92F0-59BE2DC235A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"55A5149F-EFD9-47A6-9E0A-5CC527F692C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1457138A-4081-455B-B5BA-28D7CC14EC6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"840635FC-4FDB-4198-A79B-792B643A9388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E5881B-7BCE-47A9-883E-0F5B9D223F81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED101A1B-A785-4F81-9C94-DB4F12BAA088\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97-final:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1664490B-CA34-44A3-8EEC-71A07799E870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C151E6E5-AC14-4C12-B1E4-4FDED6F5CF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7E10AE-9B98-4801-91CD-F6EEC75B9C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFF21C85-76FC-463C-8661-60BE2D3CAC10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21110017-470F-4C38-B09F-8DF94E48EFE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BA24CD0-22DA-4689-981D-88FAA7FCC1C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1931478E-A672-4CF6-9BDC-B3C73B7DA5A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C4863E-76DA-4E38-B2C7-B30037633030\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E60DE27-EE96-44D1-9469-ACB4EB03CCBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2059AE45-9F9C-4D26-B53A-E61576EBF163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BD78C76-3679-47DD-B9A9-CDA0B34EEDEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98:final:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC69E38-9872-460F-841B-BBE1110FC1B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F812030-6DC3-4A8C-824F-3185AC4F0619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1917ECFC-BCD2-464C-B4C7-6D87A3B50DC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57A8D91C-EEEB-4F76-8010-2CB174A9B091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1831F7D-7366-4775-9B70-832F3BAB23E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE763375-34A0-4D2D-BEC2-D9F9232A1D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962C592B-1B02-49EE-9C82-2EA1B0F0F4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA327868-1A00-4BFE-AB29-3DBE57545EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09575AA6-7F8C-4A9C-B781-C892B00C3035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3810E39-63C2-486A-9FFC-C7BBC6DCD455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.98.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07E6BD24-3843-479E-9DD0-56C69F8A0B71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E823CA-D59A-404F-A064-25F557BEBD5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C84C4B-3133-4589-B17E-903F78086A3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"366DE55B-E2FC-4CA1-B35C-1F09942A31A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1B51DC2-7C58-4073-B352-02A0B56D447E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"209642A4-56B7-4345-B09D-57636A3D221F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD057E44-D7B8-414C-A21D-DEC8753F0C50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"79BC687A-A16D-4923-B592-549E12272045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C400CA8-7CE1-4E6D-ABAD-102E4BD12C6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D968FE34-54C4-4C06-8EB7-0537EDAAD6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C6966F1-F1F5-45F6-B446-8408EB1DE9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CAD1DE8-7D55-4C0B-B691-E8D8AA6E2689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70576B73-12AF-463B-96AB-18725ACDECFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:0.99.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F6EBD8-4BFD-49FC-A087-8698DB462880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3737B53D-E0BC-430F-9B00-5F13C15E3EF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF48827A-8F95-4D07-BB35-AD43A048072B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10DB2640-6C1B-4B95-998C-3737809C9E40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A4B5B69-85CF-40C8-BC79-C340A6445F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8992045B-1EC7-4254-966E-AECDAEFD950E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14C4E0E1-FC73-4641-A7AC-47E25EAE251B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF00DCF7-A5B8-4B62-9F4F-EB2273589215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"947E46FD-1B9D-4F64-8C10-FF332796CFE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B72E9F25-975E-4609-A741-F472CEB53265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D76E5AE-B1D2-4362-915A-A6C15225F772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6BC5DF-3A1E-4B1F-87E9-857AE413841C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3928B3DD-CA7E-4204-A49A-7B6E1F973B47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"091BB6EB-7263-4DD2-8B57-B1FF73D61B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.13:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"C462D2DB-B831-4395-A697-412AF5269E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C705AE7A-8F8B-49C1-BEA4-B1486AAE9E2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0AB8F16-5A30-4D85-A3E0-E8EECD5EEA69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"893F2C07-21F3-4B1E-B295-6B4DD20B97B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F4CFB6-9BD7-467E-ACDD-879D782DD2A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10A65F7-517F-4966-B83F-7323C8ADA70C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76D15CD-FECF-435F-A7E4-54FE53638C1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"F621BF1C-B9F1-4055-B5D8-6FC70BB3A6D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8669B8EC-482D-44CD-B30E-7D83423E1BC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B67A0244-D65F-4CCE-A084-31AD9A3D9B8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFD2D751-2B85-428E-8766-36F92B338C5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pureftpd:pure-ftpd:1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"579ECF9F-EBED-49BC-A804-86C71554D06C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0545634-EC4A-48E8-AB3D-49802FB11758\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"60FBDD82-691C-4D9D-B71B-F9AFF6931B53\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"25CBACD3-AFB7-410D-927F-0C1FF477D396\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A53FF936-C785-4CEF-BAD0-3C3EB90EE466\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE26596F-F10E-44EF-88CA-0080646E91B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:vmware:*:*:*:*:*\",\"matchCriteriaId\":\"B654E601-9B41-416B-9619-A60E6151EC68\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00015.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00016.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/49541\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/69686\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/49541\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/69686\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.