
CVE-2011-4722 – Ipswitch TFTP Server 1.0.0.24 - Directory Traversal
https://notcve.org/view.php?id=CVE-2011-4722
28 Dec 2014 — Directory traversal vulnerability in the TFTP Server 1.0.0.24 in Ipswitch WhatsUp Gold allows remote attackers to read arbitrary files via a .. (dot dot) in the Filename field of an RRQ operation. Vulnerailidad de salto en disco en TFTP Server 1.0.0.24 en Ipswitch WhatsUp Gold permite a atacantes remotos leer ficheros arbitrarios a través de .. (punto punto) en el campo Filename de una operación RRQ Directory traversal vulnerability in the TFTP Server 1.0.0.24 in Ipswitch WhatsUp Gold allows remote attacker... • https://packetstorm.news/files/id/180941 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2010-1174 – Cisco TFTP Server 1.1 - Denial of Service
https://notcve.org/view.php?id=CVE-2010-1174
29 Mar 2010 — Cisco TFTP Server 1.1 allows remote attackers to cause a denial of service (daemon crash) via a crafted (1) read (aka RRQ) or (2) write (aka WRQ) request, or other TFTP packet. NOTE: some of these details are obtained from third party information. Cisco TFTP Server v1.1 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de una petición modificada (1) read (aka RRQ) o (2) write (aka WRQ), u otro paquete TFTP. NOTA: algunos de estos detalles han sido obtenidos de info... • https://www.exploit-db.com/exploits/11878 • CWE-20: Improper Input Validation •

CVE-2009-3115 – SolarWinds TFTP Server 9.2.0.111 - Remote Denial of Service
https://notcve.org/view.php?id=CVE-2009-3115
09 Sep 2009 — SolarWinds TFTP Server 9.2.0.111 and earlier allows remote attackers to cause a denial of service (service stop) via a crafted Option Acknowledgement (OACK) request. NOTE: some of these details are obtained from third party information. SolarWinds TFTP Server v9.2.0.111 y anteriores permite a atacantes remotos provocar una denegación de servicio (parada del servicio) a través de una petición Option Acknowledgement (OACK) manipulada. NOTA: algunos de estos detalles han sido obtenidos a partir de información ... • https://www.exploit-db.com/exploits/9547 • CWE-20: Improper Input Validation •

CVE-2007-1435 – D-Link TFTP 1.0 - Transporting Mode Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-1435
13 Mar 2007 — Buffer overflow in D-Link TFTP Server 1.0 allows remote attackers to cause a denial of service (crash) via a long (1) GET or (2) PUT request, which triggers memory corruption. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Desbordamiento de búfer en D-Link TFTP Server 1.0 permite a atacantes remotos provocar una denegación de servicio (caída) mediante una petición (1) GET o (2) PUT larga. NOTA: la procedencia de esta información es desconoc... • https://www.exploit-db.com/exploits/29735 •

CVE-2006-1952
https://notcve.org/view.php?id=CVE-2006-1952
24 Apr 2006 — Directory traversal vulnerability in WinAgents TFTP Server for Windows 3.1 and earlier allows remote attackers to read arbitrary files via "..." (triple dot) sequences in a GET request. • http://secunia.com/advisories/19844 •

CVE-2004-2432
https://notcve.org/view.php?id=CVE-2004-2432
31 Dec 2004 — WinAgents TFTP Server 3.0 allows remote attackers to cause a denial of service (crash) via a request for a file with a long file name, possibly due to an off-by-one buffer overflow. • http://secunia.com/advisories/11840 •

CVE-2002-2237
https://notcve.org/view.php?id=CVE-2002-2237
31 Dec 2002 — tftp32 TFTP server 2.21 and earlier allows remote attackers to cause a denial of service via a GET request with a DOS device name such as com1 or aux. • http://archives.neohapsis.com/archives/bugtraq/2002-12/0084.html • CWE-20: Improper Input Validation •

CVE-2001-0783
https://notcve.org/view.php?id=CVE-2001-0783
12 Oct 2001 — Cisco TFTP server 1.1 allows remote attackers to read arbitrary files via a ..(dot dot) attack in the GET command. • http://archives.neohapsis.com/archives/bugtraq/2001-06/0227.html •