Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcp ip vulnerabilities and exploits
(subscribe to this query)
465
VMScore
CVE-2002-1513
The UCX POP server in HP TCP/IP services for OpenVMS 4.2 up to and including 5.3 allows local users to truncate arbitrary files via the -logfile command line option, which overrides file system permissions because the server runs with the SYSPRV and BYPASS privileges.
Compaq Tcp-ip Services 4.2
Compaq Tcp-ip Services 5.0a
Compaq Tcp-ip Services 5.1
Compaq Tcp-ip Services 5.3
1 EDB exploit
445
VMScore
CVE-2011-3169
Unspecified vulnerability in the SMTP service implementation in HP TCP/IP Services 5.6 and 5.7 for OpenVMS allows remote malicious users to cause a denial of service via unknown vectors.
Hp Tcp Ip Services Openvms 5.6
Hp Tcp Ip Services Openvms 5.7
445
VMScore
CVE-2011-3168
Unspecified vulnerability in the POP and IMAP service implementations in HP TCP/IP Services 5.6 and 5.7 for OpenVMS allows remote malicious users to obtain sensitive information via unknown vectors.
Hp Tcp Ip Services Openvms 5.6
Hp Tcp Ip Services Openvms 5.7
445
VMScore
CVE-2021-45445
Unisys ClearPath MCP TCP/IP Networking Services 59.1, 60.0, and 62.0 has an Infinite Loop.
Unisys Clearpath Mcp Tcp\\/ip Networking Services 59.1
Unisys Clearpath Mcp Tcp\\/ip Networking Services 60.0
Unisys Clearpath Mcp Tcp\\/ip Networking Services 62.0
668
VMScore
CVE-2020-25066
A heap-based buffer overflow in the Treck HTTP Server component prior to 6.0.1.68 allows remote malicious users to cause a denial of service (crash/reset) or to possibly execute arbitrary code.
Treck Tcp\\/ip
NA
CVE-2020-27630
In Silicon Labs uC/TCP-IP 3.6.0, TCP ISNs are improperly random.
Silabs Uc\\/tcp-ip 3.6.0
445
VMScore
CVE-2014-7880
Multiple unspecified vulnerabilities in the POP implementation in HP OpenVMS TCP/IP 5.7 before ECO5 allow remote malicious users to cause a denial of service via unspecified vectors.
Hp Tcp Ip Services Openvms
445
VMScore
CVE-2020-25927
The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Out-of-bounds Read. The impact is: a denial of service (remote). The component is: DNS response processing in function: dns_upcall(). The attack vector is: a specific DNS response packet. The code does not chec...
Hcc-embedded Nichestack Tcp\\/ip 4.0.1
668
VMScore
CVE-2020-25928
The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: DNS response processing functions: dns_upcall(), getoffset(), dnc_set_answer(). The attack vector is: a specific DNS response p...
Hcc-embedded Nichestack Tcp\\/ip 4.0.1
445
VMScore
CVE-2020-25926
The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet.
Hcc-embedded Nichestack Tcp\\/ip 4.0.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27975
CVE-2024-2961
CVE-2024-20380
XML injection
HTML injection
CVE-2024-29204
CVE-2023-51795
memory leak
CVE-2024-3470
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »