Vulnerabilities (CVE)

Filtered by vendor Solarwinds Subscribe
Filtered by product Serv-u
Total 29 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-27994 1 Solarwinds 1 Serv-u 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
SolarWinds Serv-U before 15.2.2 allows Authenticated Directory Traversal.
CVE-2020-15576 1 Solarwinds 1 Serv-u 2024-11-21 5.0 MEDIUM 7.5 HIGH
SolarWinds Serv-U File Server before 15.2.1 allows information disclosure via an HTTP response.
CVE-2020-15575 1 Solarwinds 1 Serv-u 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
SolarWinds Serv-U File Server before 15.2.1 allows XSS as demonstrated by Tenable Scan, aka Case Number 00484194.
CVE-2020-15574 1 Solarwinds 1 Serv-u 2024-11-21 5.0 MEDIUM 7.5 HIGH
SolarWinds Serv-U File Server before 15.2.1 mishandles the Same-Site cookie attribute, aka Case Number 00331893.
CVE-2020-15573 1 Solarwinds 1 Serv-u 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
SolarWinds Serv-U File Server before 15.2.1 has a "Cross-script vulnerability," aka Case Numbers 00041778 and 00306421.
CVE-2018-10241 1 Solarwinds 1 Serv-u 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
A denial of service vulnerability in SolarWinds Serv-U before 15.1.6 HFv1 allows an authenticated user to crash the application (with a NULL pointer dereference) via a specially crafted URL beginning with the /Web%20Client/ substring.
CVE-2018-10240 1 Solarwinds 1 Serv-u 2024-11-21 5.0 MEDIUM 7.3 HIGH
SolarWinds Serv-U MFT before 15.1.6 HFv1 assigns authenticated users a low-entropy session token that can be included in requests to the application as a URL parameter in lieu of a session cookie. This session token's value can be brute-forced by an attacker to obtain the corresponding session cookie and hijack the user's session.
CVE-2024-45714 1 Solarwinds 1 Serv-u 2024-10-30 N/A 4.1 MEDIUM
Application is vulnerable to Cross Site Scripting (XSS) an authenticated attacker with users’ permissions can modify a variable with a payload.
CVE-2024-45711 1 Solarwinds 1 Serv-u 2024-10-17 N/A 8.8 HIGH
SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where remote code execution is possible depending on privileges given to the authenticated user. This issue requires a user to be authenticated and this is present when software environment variables are abused. Authentication is required for this vulnerability