Page 2 of 11 results (0.016 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Heap-based overflow vulnerability in TFTP Server SP 1.66 and earlier allows remote attackers to perform a denial of service or possibly execute arbitrary code via a long TFTP error packet, a different vulnerability than CVE-2008-2161. Una vulnerabilidad de desbordamiento en la región heap de la memoria en TFTP Server SP versión 1.66 y anteriores, permite a atacantes remotos llevar a cabo una denegación de servicio o posiblemente ejecutar código arbitrario por medio de un paquete de error TFTP largo, una vulnerabilidad diferente de CVE-2008-2161. • https://sourceforge.net/p/tftp-server/discussion/550564/thread/a586ce62 • CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 68%CPEs: 3EXPL: 1

Buffer overflow in TFTP Server SP 1.4 and 1.5 on Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a long TFTP error packet. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer en TFTP Server SP 1.4 y 1.5 en Windows y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección mediante un paquete de error TFTP largo. NOTA: algunos de estos detalles se han obtenido de terceros. • https://www.exploit-db.com/exploits/5563 http://secunia.com/advisories/30147 http://www.securityfocus.com/bid/29111 http://www.vupen.com/english/advisories/2008/1468/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42298 http://downloads.securityfocus.com/vulnerabilities/exploits/29111.pl • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 41%CPEs: 1EXPL: 5

Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote attackers to cause a denial of service or execute arbitrary code via a long filename in a read or write request. Desbordamiento de Búfer basado en Pila en TFTP Server SP 1.4 para Windows, permite a atacantes remotos provocar una denegación de servicio o ejecutar código de su elección mediante un campo filename largo en una petición de lectura o escritura. • https://www.exploit-db.com/exploits/18759 https://www.exploit-db.com/exploits/18345 https://www.exploit-db.com/exploits/5314 https://github.com/Axua/CVE-2008-1611 http://secunia.com/advisories/29508 http://www.offensive-security.com/0day/sourceforge-tftpd.py.txt http://www.securityfocus.com/bid/28462 https://exchange.xforce.ibmcloud.com/vulnerabilities/41496 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function. • http://marc.info/?l=bugtraq&m=109882085912915&w=2 http://www.securityfocus.com/bid/11527 https://exchange.xforce.ibmcloud.com/vulnerabilities/17878 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 1

tftp32 TFTP server 2.21 and earlier allows remote attackers to cause a denial of service via a GET request with a DOS device name such as com1 or aux. • http://archives.neohapsis.com/archives/bugtraq/2002-12/0084.html http://www.kb.cert.org/vuls/id/632633 https://exchange.xforce.ibmcloud.com/vulnerabilities/10817 • CWE-20: Improper Input Validation •