Show plain JSON{"id": "CVE-2001-1113", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2001-08-13T04:00:00.000", "references": [{"url": "ftp://ftp.trolltech.com/freebies/ftpd/troll-ftpd-1.27.tar.gz", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/203874", "tags": ["Exploit", "Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/3174", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6974", "source": "cve@mitre.org"}, {"url": "ftp://ftp.trolltech.com/freebies/ftpd/troll-ftpd-1.27.tar.gz", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/203874", "tags": ["Exploit", "Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/3174", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6974", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in TrollFTPD 1.26 and earlier allows local users to execute arbitrary code by creating a series of deeply nested directories with long names, then running the ls -R (recursive) command."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:trolltech:trollftpd:1.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83D2AAD1-AD99-43F3-A8AE-44C3120E7EF9"}, {"criteria": "cpe:2.3:a:trolltech:trollftpd:1.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90D61B78-BD7B-48BD-B36B-78B57807CD0F"}, {"criteria": "cpe:2.3:a:trolltech:trollftpd:1.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD3A545E-E357-4FCC-B2B8-5422544AB99E"}, {"criteria": "cpe:2.3:a:trolltech:trollftpd:1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A42C8E53-B7AC-4336-9411-DA6D9F90A3AF"}, {"criteria": "cpe:2.3:a:trolltech:trollftpd:1.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39FA16CB-D4FC-4914-BC31-8695FE8F8F09"}, {"criteria": "cpe:2.3:a:trolltech:trollftpd:1.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADB7F4AB-9285-4EC5-8722-A59CA9883442"}, {"criteria": "cpe:2.3:a:trolltech:trollftpd:1.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFA95792-77DE-4D6C-A2E8-1FE1570FF090"}, {"criteria": "cpe:2.3:a:trolltech:trollftpd:1.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3948A6AF-C7D2-45BD-BBA0-152DEF4A7C1D"}, {"criteria": "cpe:2.3:a:trolltech:trollftpd:1.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "861413E3-704B-4B5B-A159-DB6640295A7D"}, {"criteria": "cpe:2.3:a:trolltech:trollftpd:1.26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1BB597A-1CDE-435F-931C-A99E0A9AB5B8"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}