Page 5 of 25 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A denial of service vulnerability in SolarWinds Serv-U before 15.1.6 HFv1 allows an authenticated user to crash the application (with a NULL pointer dereference) via a specially crafted URL beginning with the /Web%20Client/ substring. Una vulnerabilidad de denegación de servicio (DoS) en SolarWinds Serv-U en versiones anteriores a la 15.1.6 HFv1 permite que un usuario autenticado provoque el cierre inesperado de la aplicación (con una desreferencia de puntero NULL) mediante una URL especialmente manipulada que comienza con la subcadena /Web%20Client/. • https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-denial-of-service • CWE-476: NULL Pointer Dereference •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

SolarWinds Serv-U MFT before 15.1.6 HFv1 assigns authenticated users a low-entropy session token that can be included in requests to the application as a URL parameter in lieu of a session cookie. This session token's value can be brute-forced by an attacker to obtain the corresponding session cookie and hijack the user's session. SolarWinds Serv-U MFT en versiones anteriores a la 15.1.6 HFv1 asigna a usuarios autenticados un token de sesión con poca entropía que puede incluirse en peticiones a la aplicación como un parámetro URL en lugar de una cookie de sesión. El valor del token de sesión puede ser adivinado a la fuerza por un atacante para obtener la correspondiente cookie de sesión y secuestrar la sesión de usuario. • https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-insufficient-session-id-entropy • CWE-331: Insufficient Entropy •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 2

Serv-U FTP Server allows remote attackers to bypass its anti-hammering feature by first logging on as a valid user (possibly anonymous) and then attempting to guess the passwords of other users. • https://www.exploit-db.com/exploits/20334 http://www.securityfocus.com/archive/1/141905 http://www.securityfocus.com/bid/1860 https://exchange.xforce.ibmcloud.com/vulnerabilities/5436 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 1

The default configuration of Serv-U 2.5d and earlier allows remote attackers to determine the real pathname of the server by requesting a URL for a directory or file that does not exist. • http://archives.neohapsis.com/archives/bugtraq/2000-02/0417.html http://www.securityfocus.com/bid/1016 •

CVSS: 7.8EPSS: 10%CPEs: 1EXPL: 1

Buffer overflow in FTP Serv-U 2.5 allows remote authenticated users to cause a denial of service (crash) via a long (1) CWD or (2) LS (list) command. • https://www.exploit-db.com/exploits/19218 http://marc.info/?l=ntbugtraq&m=92574916930144&w=2 http://marc.info/?l=ntbugtraq&m=92582581330282&w=2 http://www.securityfocus.com/bid/269 https://exchange.xforce.ibmcloud.com/vulnerabilities/205 •