{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T01:58:14.888","vulnerabilities":[{"cve":{"id":"CVE-2008-3731","sourceIdentifier":"cve@mitre.org","published":"2008-08-20T16:41:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Serv-U File Server 7.0.0.1, and other versions before 7.2.0.1, allows remote authenticated users to cause a denial of service (daemon crash) via an SSH session with SFTP commands for directory creation and logging."},{"lang":"es","value":"Una vulnerabilidad no especificada en Serv-U File Server versiones 7.0.0.0.1, y otras versiones anteriores a 7.2.0.1, permite a usuarios autenticados remotos causar una denegación de servicio (bloqueo del demonio) por medio de una sesión SSH con comandos SFTP para la creación y registro de directorios."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.1:*:*:*:*:*:*:*","matchCriteriaId":"92DB160E-82FF-4360-970B-9DA8F8C80C7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.2:*:*:*:*:*:*:*","matchCriteriaId":"97835C15-FDFA-4483-B8F5-062731E912B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.3:*:*:*:*:*:*:*","matchCriteriaId":"64D43FB7-6D9C-46AE-9831-6C1A8CF8146E"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.4:*:*:*:*:*:*:*","matchCriteriaId":"CE52F36F-FA2F-476C-9F30-5F74DC0F3D29"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.0:*:*:*:*:*:*:*","matchCriteriaId":"B3D000B5-04D7-431C-AA2B-BC8D0475A518"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"C74BAC99-DF37-4AE4-AF48-69C6E855CEC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"50FCBA2E-F6EE-4C52-B2DA-5174EF110DF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.0:*:*:*:*:*:*:*","matchCriteriaId":"E40D1816-BD4A-4405-8461-07DA732C5CE2"}]}]}],"references":[{"url":"http://secunia.com/advisories/31461","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/30739","source":"cve@mitre.org"},{"url":"http://www.serv-u.com/releasenotes/","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44537","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/31461","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/30739","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.serv-u.com/releasenotes/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44537","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"Upgrade to 7.2.0.1"}}]}