Page 3 of 13 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function. • http://marc.info/?l=bugtraq&m=109882085912915&w=2 http://www.securityfocus.com/bid/11527 https://exchange.xforce.ibmcloud.com/vulnerabilities/17878 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 1

tftp32 TFTP server 2.21 and earlier allows remote attackers to cause a denial of service via a GET request with a DOS device name such as com1 or aux. • http://archives.neohapsis.com/archives/bugtraq/2002-12/0084.html http://www.kb.cert.org/vuls/id/632633 https://exchange.xforce.ibmcloud.com/vulnerabilities/10817 • CWE-20: Improper Input Validation •

CVSS: 6.4EPSS: 23%CPEs: 2EXPL: 0

Linux implementations of TFTP would allow access to files outside the restricted directory. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0183 •