5 results (0.010 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

TFTP in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) via a GET request containing an MS-DOS device name. • http://marc.info/?l=bugtraq&m=110485674622696&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/18750 •

CVSS: 5.0EPSS: 21%CPEs: 1EXPL: 4

Buffer overflow in the FTP service in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via (1) a long username in the USER command or (2) an FTP command that contains a long argument, such as cd, send, or ls. • https://www.exploit-db.com/exploits/16730 https://www.exploit-db.com/exploits/827 https://www.exploit-db.com/exploits/825 http://marc.info/?l=bugtraq&m=110485674622696&w=2 http://marc.info/?l=bugtraq&m=110886719528518&w=2 http://www.securityfocus.com/bid/12155 https://exchange.xforce.ibmcloud.com/vulnerabilities/18754 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Multiple format string vulnerabilities in the FTP service in 3Com 3CDaemon 2.0 revision 10 allow remote attackers to cause a denial of service (application crash) via format string specifiers in (1) the username, (2) cd, (3) delete, (4) rename, (5) rmdir, (6) literal, (7) stat, or (8) CWD commands. • http://marc.info/?l=bugtraq&m=110485674622696&w=2 http://www.securityfocus.com/bid/12155 https://exchange.xforce.ibmcloud.com/vulnerabilities/18751 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

The FTP service in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to gain sensitive information via a cd command that contains an MS-DOS device name, which reveals the installation path in an error message. • http://marc.info/?l=bugtraq&m=110485674622696&w=2 http://www.securityfocus.com/bid/12155 https://exchange.xforce.ibmcloud.com/vulnerabilities/18756 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Buffer overflow in 3Cdaemon 2.0 FTP server allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long commands such as login. • https://www.exploit-db.com/exploits/21429 http://archives.neohapsis.com/archives/bugtraq/2002-04/0428.html http://www.iss.net/security_center/static/8970.php http://www.securityfocus.com/bid/4638 •