Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tftpd32 tftpd32 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-34574
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows malicious users to obtain the key information of the device via accessing Tftpd32.ini.
Wavlink Wifi-repeater Firmware Rpta2-77w.m4300.01.gd.2017sep19
5
CVSSv2
CVE-2013-6809
Format string vulnerability in the client in Tftpd32 prior to 4.50 allows remote servers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the Remote File field.
Philippe Jounin Tftpd32 3.02
Philippe Jounin Tftpd32 3.51
Philippe Jounin Tftpd32 3.50
Philippe Jounin Tftpd32 2.81
Philippe Jounin Tftpd32 2.71
Philippe Jounin Tftpd32 2.70
Philippe Jounin Tftpd32 1.1
Philippe Jounin Tftpd32 3.28
Philippe Jounin Tftpd32 2.53
Philippe Jounin Tftpd32 3.00
Philippe Jounin Tftpd32 2.54
Philippe Jounin Tftpd32 2.21
Philippe Jounin Tftpd32 3.31
Philippe Jounin Tftpd32 2.60
Philippe Jounin Tftpd32 3.33
Philippe Jounin Tftpd32 1.0
Philippe Jounin Tftpd32 3.10
Philippe Jounin Tftpd32 3.20
Philippe Jounin Tftpd32 3.22
Philippe Jounin Tftpd32 2.74
Philippe Jounin Tftpd32 3.03
Philippe Jounin Tftpd32 2.84
5
CVSSv2
CVE-2005-4882
tftpd in Philippe Jounin Tftpd32 2.74 and previous versions, as used in Wyse Simple Imager (WSI) and other products, allows remote malicious users to cause a denial of service (daemon crash) via a long filename in a TFTP read (aka RRQ or get) request, a different vulnerability th...
Philippe Jounin Tftpd32 2.5
Philippe Jounin Tftpd32 2.70
Philippe Jounin Tftpd32 2.53
Philippe Jounin Tftpd32 2.54
Philippe Jounin Tftpd32 2.60
Philippe Jounin Tftpd32 2.72
Philippe Jounin Tftpd32 2.73
Philippe Jounin Tftpd32 2.51
Philippe Jounin Tftpd32
Philippe Jounin Tftpd32 2.62
Philippe Jounin Tftpd32 2.52
4.3
CVSSv2
CVE-2005-4883
Race condition in Philippe Jounin Tftpd32 prior to 2.80 allows remote malicious users to cause a denial of service (daemon crash) via invalid "connect frames."
Philippe Jounin Tftpd32 2.5
Philippe Jounin Tftpd32 2.70
Philippe Jounin Tftpd32 2.53
Philippe Jounin Tftpd32 2.54
Philippe Jounin Tftpd32 2.60
Philippe Jounin Tftpd32 2.72
Philippe Jounin Tftpd32 2.73
Philippe Jounin Tftpd32 2.51
Philippe Jounin Tftpd32
Philippe Jounin Tftpd32 2.62
Philippe Jounin Tftpd32 2.52
5
CVSSv2
CVE-2006-6141
Buffer overflow in Tftpd32 3.01 allows remote malicious users to cause a denial of service via a long GET or PUT request, which is not properly handled when the request is displayed in the title of the gauge window.
Philippe Jounin Tftpd32 3.01
5
CVSSv2
CVE-2006-0328
Format string vulnerability in Tftpd32 2.81 allows remote malicious users to cause a denial of service via format string specifiers in a filename in a (1) GET or (2) SEND request.
Philippe Jounin Tftpd32 2.81
1 EDB exploit
5
CVSSv2
CVE-2002-2237
tftp32 TFTP server 2.21 and previous versions allows remote malicious users to cause a denial of service via a GET request with a DOS device name such as com1 or aux.
Tftp Tftp Server 2.21
7.5
CVSSv2
CVE-2002-2226
Buffer overflow in tftpd of TFTP32 2.21 and previous versions allows remote malicious users to execute arbitrary code via a long filename argument.
Tftpd32 Tftpd32
2 EDB exploits
6.4
CVSSv2
CVE-2002-2353
tftpd32 2.50 and 2.50.2 allows remote malicious users to read or write arbitrary files via a full pathname in GET and PUT requests.
Tftpd32 Tftpd32 2.50
Tftpd32 Tftpd32 2.50.2
1 EDB exploit
NA
CVE-2003-6141
Wyse Simple Imager (WSI) is a component of Wyse Device Manager (WDM, formerly known as Wyse Rapport). WSI includes TFTPD32 as the TFTP service to load firmware images on client devices. The versions of TFTPD32 contains several known vulnerabilities. The following list of TFTPD32 ...
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started