header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AT-TFTP Server v1.9 Buffer Overflow Vulnerability

A vulnerability has been identified in TFTP Server AT-TFTP Server v1.9, which could be exploited by remote or local attackers to execute arbitrary commands or cause a denial of service. This flaw is due to a buffer overflow error when handling an overly long file name (more than 227 bytes) passed to a 'GET' or 'PUT' command, which could be exploited by malicious users to compromise a vulnerable system or crash an affected application.

AT-TFTP 2.0 long filename stack based buffer overflow – DOS

AT-TFTP 2.0 is vulnerable to a stack based buffer overflow vulnerability. The vulnerability is triggered when a maliciously crafted packet is sent to the server. This can lead to a denial of service (DoS) condition. The vulnerability was discovered in 2006 by liuqx@nipc.org.cn and is still present in version 2.0. The exploit can be triggered remotely and has been tested on Windows XP SP3.

Recent Exploits: