6 results (0.004 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

SolarWinds TFTP Server 10.4.0.13 allows remote attackers to cause a denial of service (crash) via a long write request. SolarWinds TFTP Server v10.4.0.13, permite a atacantes remotos provocar una denegación de servicio (caída) a través de una petición de escritura larga. • https://www.exploit-db.com/exploits/13836 http://osvdb.org/65540 http://www.exploit-db.com/exploits/13836 http://www.securityfocus.com/bid/40824 https://exchange.xforce.ibmcloud.com/vulnerabilities/59419 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 57%CPEs: 1EXPL: 2

SolarWinds TFTP Server 10.4.0.10 allows remote attackers to cause a denial of service (no new connections) via a crafted read request. Servidor SolarWinds TFTP v10.4.0.10 permite a atacantes remotos provocar una denegación de servicio (impide conexiones nuevas) a través de una petición de lectura manipulada. The SolarWinds TFTP server can be shut down by sending a netascii read request with a specially crafted file name. • https://www.exploit-db.com/exploits/12683 http://osvdb.org/64845 http://secunia.com/advisories/39896 http://www.exploit-db.com/exploits/12683 http://www.securitytracker.com/id?1024019 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 3%CPEs: 5EXPL: 3

SolarWinds TFTP Server 9.2.0.111 and earlier allows remote attackers to cause a denial of service (service stop) via a crafted Option Acknowledgement (OACK) request. NOTE: some of these details are obtained from third party information. SolarWinds TFTP Server v9.2.0.111 y anteriores permite a atacantes remotos provocar una denegación de servicio (parada del servicio) a través de una petición Option Acknowledgement (OACK) manipulada. NOTA: algunos de estos detalles han sido obtenidos a partir de información de terceros. • https://www.exploit-db.com/exploits/9547 http://secunia.com/advisories/36505 http://www.exploit-db.com/exploits/9547 http://www.securityfocus.com/bid/36182 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Directory traversal vulnerability in SolarWinds TFTP Server 8.1 and earlier allows remote attackers to download arbitrary files via a crafted GET request including "....//" sequences, which are collapsed into "../" sequences by filtering. • http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0009.html http://secunia.com/advisories/19848 http://securityreason.com/securityalert/778 http://www.rapid7.com/advisories/R7-0019.html http://www.securityfocus.com/archive/1/431729/100/0/threaded http://www.securityfocus.com/bid/17648 http://www.vupen.com/english/advisories/2006/1561 https://exchange.xforce.ibmcloud.com/vulnerabilities/25969 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 3

SolarWinds TFTP server 5.0.55 and earlier allows remote attackers to cause a denial of service (crash) via a large UDP datagram, possibly triggering a buffer overflow. SolarWinds TFTP server 5.0.55 y anteriores permite a atacantes remotos causar la Denegación de Servicios (DoS)(caida) mediante un datagrama UDP largo, posiblemete provocando un desbordamiento de búfer. • https://www.exploit-db.com/exploits/21963 http://archives.neohapsis.com/archives/bugtraq/2002-10/0344.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0040.html http://www.iss.net/security_center/static/10462.php http://www.securityfocus.com/bid/6043 •