Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2020-26130

Disclosure Date: October 28, 2020 (last updated February 22, 2025)
Issues were discovered in Open TFTP Server multithreaded 1.66 and Open TFTP Server single port 1.66. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenTFTPServerMT.exe or the OpenTFTPServerSP.exe binary.
Attacker Value
Unknown

CVE-2019-12567

Disclosure Date: December 23, 2019 (last updated November 27, 2024)
Stack-based overflow vulnerability in the logMess function in Open TFTP Server MT 1.65 and earlier allows remote attackers to perform a denial of service or execute arbitrary code via a long TFTP error packet, a different vulnerability than CVE-2018-10387 and CVE-2019-12568.
Attacker Value
Unknown

CVE-2018-10387

Disclosure Date: December 23, 2019 (last updated November 27, 2024)
Heap-based overflow vulnerability in TFTP Server SP 1.66 and earlier allows remote attackers to perform a denial of service or possibly execute arbitrary code via a long TFTP error packet, a different vulnerability than CVE-2008-2161.
Attacker Value
Unknown

CVE-2018-10388

Disclosure Date: December 23, 2019 (last updated November 27, 2024)
Format string vulnerability in the logMess function in TFTP Server SP 1.66 and earlier allows remote attackers to perform a denial of service or execute arbitrary code via format string sequences in a TFTP error packet.
Attacker Value
Unknown

CVE-2019-12568

Disclosure Date: September 11, 2019 (last updated November 27, 2024)
Stack-based overflow vulnerability in the logMess function in Open TFTP Server SP 1.66 and earlier allows remote attackers to perform a denial of service or execute arbitrary code via a long TFTP error packet, a different vulnerability than CVE-2018-10387 and CVE-2019-12567.
Attacker Value
Unknown

CVE-2018-10389

Disclosure Date: April 02, 2018 (last updated November 27, 2024)
Format string vulnerability in the logMess function in TFTP Server MT 1.65 and earlier allows remote attackers to perform a denial of service or execute arbitrary code via format string sequences in a TFTP error packet.