{"id":"CVE-2011-4130","details":"Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.","modified":"2026-04-10T03:42:02.372186Z","published":"2011-12-06T11:55:06Z","related":["openSUSE-SU-2024:10048-1"],"references":[{"type":"ADVISORY","url":"http://www.zerodayinitiative.com/advisories/ZDI-11-328/"},{"type":"EVIDENCE","url":"http://bugs.proftpd.org/show_bug.cgi?id=3711"},{"type":"FIX","url":"http://bugs.proftpd.org/show_bug.cgi?id=3711"},{"type":"WEB","url":"http://www.proftpd.org/docs/NEWS-1.3.3g"},{"type":"WEB","url":"http://www.securityfocus.com/bid/50631"}],"schema_version":"1.7.5"}