Search for packages
| purl | pkg:deb/debian/netkit-tftp@0.17-25?distro=bullseye |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-jw1r-x7s2-tkdj | Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function. |
CVE-2004-1485
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T09:41:47.672725+00:00 | Debian Importer | Fixing | VCID-jw1r-x7s2-tkdj | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-11T18:26:58.029685+00:00 | Debian Importer | Fixing | VCID-jw1r-x7s2-tkdj | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-03T07:46:50.887488+00:00 | Debian Importer | Fixing | VCID-jw1r-x7s2-tkdj | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |