3 results (0.003 seconds)

CVSS: 9.8EPSS: 52%CPEs: 1EXPL: 1

28 Mar 2005 — Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated. • https://www.exploit-db.com/exploits/25303 •

CVSS: 9.8EPSS: 47%CPEs: 1EXPL: 0

28 Mar 2005 — Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

10 Sep 1991 — The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it does not include an "ftp=yes" line, which allows remote attackers to read and modify arbitrary files. • http://www.cert.org/advisories/CA-1991-15.html •