CVE-2009-3115 – SolarWinds TFTP Server 9.2.0.111 - Remote Denial of Service
https://notcve.org/view.php?id=CVE-2009-3115
SolarWinds TFTP Server 9.2.0.111 and earlier allows remote attackers to cause a denial of service (service stop) via a crafted Option Acknowledgement (OACK) request. NOTE: some of these details are obtained from third party information. SolarWinds TFTP Server v9.2.0.111 y anteriores permite a atacantes remotos provocar una denegación de servicio (parada del servicio) a través de una petición Option Acknowledgement (OACK) manipulada. NOTA: algunos de estos detalles han sido obtenidos a partir de información de terceros. • https://www.exploit-db.com/exploits/9547 http://secunia.com/advisories/36505 http://www.exploit-db.com/exploits/9547 http://www.securityfocus.com/bid/36182 • CWE-20: Improper Input Validation •
CVE-2007-1435 – D-Link TFTP 1.0 - Transporting Mode Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-1435
Buffer overflow in D-Link TFTP Server 1.0 allows remote attackers to cause a denial of service (crash) via a long (1) GET or (2) PUT request, which triggers memory corruption. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Desbordamiento de búfer en D-Link TFTP Server 1.0 permite a atacantes remotos provocar una denegación de servicio (caída) mediante una petición (1) GET o (2) PUT larga. NOTA: la procedencia de esta información es desconocida; los detalles se han obtenido de información de terceros. • https://www.exploit-db.com/exploits/29735 https://www.exploit-db.com/exploits/16345 http://osvdb.org/33977 http://secunia.com/advisories/24360 http://www.securityfocus.com/bid/22923 •
CVE-2006-1952
https://notcve.org/view.php?id=CVE-2006-1952
Directory traversal vulnerability in WinAgents TFTP Server for Windows 3.1 and earlier allows remote attackers to read arbitrary files via "..." (triple dot) sequences in a GET request. • http://secunia.com/advisories/19844 http://www.rapid7.com/advisories/R7-0020.html http://www.securityfocus.com/bid/17718 http://www.vupen.com/english/advisories/2006/1562 http://www.winagents.com/en/news/410.php https://exchange.xforce.ibmcloud.com/vulnerabilities/25971 •