Логотип exploitDog
bind:CVE-2020-26130
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-26130

Количество 2

Количество 2

nvd логотип

CVE-2020-26130

больше 5 лет назад

Issues were discovered in Open TFTP Server multithreaded 1.66 and Open TFTP Server single port 1.66. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenTFTPServerMT.exe or the OpenTFTPServerSP.exe binary.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-8qj5-3c9x-p5q4

больше 3 лет назад

Issues were discovered in Open TFTP Server multithreaded 1.66 and Open TFTP Server single port 1.66. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenTFTPServerMT.exe or the OpenTFTPServerSP.exe binary.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-26130

Issues were discovered in Open TFTP Server multithreaded 1.66 and Open TFTP Server single port 1.66. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenTFTPServerMT.exe or the OpenTFTPServerSP.exe binary.

CVSS3: 7.8
0%
Низкий
больше 5 лет назад
github логотип
GHSA-8qj5-3c9x-p5q4

Issues were discovered in Open TFTP Server multithreaded 1.66 and Open TFTP Server single port 1.66. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenTFTPServerMT.exe or the OpenTFTPServerSP.exe binary.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу