U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2011-0762

Change History

Modified Analysis by NIST 3/04/2021 3:13:20 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:beasts:vsftpd:0.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.5:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.6:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.7:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.8:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.9:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.10:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.11:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.12:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.13:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.14:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.0.15:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.9.1:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.9.2:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:0.9.3:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:1.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:1.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:1.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:1.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:1.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:1.1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:1.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:1.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:1.2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.0.5:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.0.6:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.0.7:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:2.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:beasts:vsftpd:*:*:*:*:*:*:*:* versions up to (including) 2.3.2
OR
     *cpe:2.3:a:vsftpd_project:vsftpd:*:*:*:*:*:*:*:* versions up to (excluding) 2.3.3
Added CWE

								
							
							
						
NIST CWE-400
Removed CWE
NIST CWE-399

								
						
Changed Reference Type
ftp://vsftpd.beasts.org/users/cevans/untar/vsftpd-2.3.4/Changelog No Types Assigned
ftp://vsftpd.beasts.org/users/cevans/untar/vsftpd-2.3.4/Changelog Broken Link
Changed Reference Type
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622741 No Types Assigned
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622741 Issue Tracking, Third Party Advisory
Changed Reference Type
http://cxib.net/stuff/vspoc232.c Exploit
http://cxib.net/stuff/vspoc232.c Broken Link
Changed Reference Type
http://jvn.jp/en/jp/JVN37417423/index.html No Types Assigned
http://jvn.jp/en/jp/JVN37417423/index.html Third Party Advisory
Changed Reference Type
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055881.html No Types Assigned
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055881.html Third Party Advisory
Changed Reference Type
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055882.html No Types Assigned
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055882.html Third Party Advisory
Changed Reference Type
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055957.html No Types Assigned
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055957.html Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=133226187115472&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=133226187115472&w=2 Issue Tracking, Third Party Advisory
Changed Reference Type
http://securityreason.com/achievement_securityalert/95 Exploit
http://securityreason.com/achievement_securityalert/95 Exploit, Third Party Advisory
Changed Reference Type
http://securityreason.com/securityalert/8109 No Types Assigned
http://securityreason.com/securityalert/8109 Exploit, Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2011/dsa-2305 No Types Assigned
http://www.debian.org/security/2011/dsa-2305 Third Party Advisory
Changed Reference Type
http://www.exploit-db.com/exploits/16270 No Types Assigned
http://www.exploit-db.com/exploits/16270 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.kb.cert.org/vuls/id/590604 US Government Resource
http://www.kb.cert.org/vuls/id/590604 Broken Link
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2011:049 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2011:049 Third Party Advisory
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2011-0337.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2011-0337.html Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/archive/1/516748/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/516748/100/0/threaded Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/46617 Exploit
http://www.securityfocus.com/bid/46617 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1025186 No Types Assigned
http://www.securitytracker.com/id?1025186 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.ubuntu.com/usn/USN-1098-1 No Types Assigned
http://www.ubuntu.com/usn/USN-1098-1 Third Party Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0547 No Types Assigned
http://www.vupen.com/english/advisories/2011/0547 Third Party Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0639 No Types Assigned
http://www.vupen.com/english/advisories/2011/0639 Third Party Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0668 No Types Assigned
http://www.vupen.com/english/advisories/2011/0668 Third Party Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0713 No Types Assigned
http://www.vupen.com/english/advisories/2011/0713 Third Party Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/65873 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/65873 Third Party Advisory, VDB Entry