Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xinetd xinetd - vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2003-0211
Memory leak in xinetd 2.3.10 allows remote malicious users to cause a denial of service (memory consumption) via a large number of rejected connections.
Xinetd Xinetd 2.3.7
Xinetd Xinetd 2.3.8
Xinetd Xinetd 2.3.1
Xinetd Xinetd 2.3.10
Xinetd Xinetd 2.3.6
Xinetd Xinetd 2.3.0
Xinetd Xinetd 2.3.3
Xinetd Xinetd 2.3.4
Xinetd Xinetd 2.3.5
Xinetd Xinetd 2.3.9
Xinetd Xinetd 2.3.2
1 EDB exploit
446
VMScore
CVE-2022-22164
An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an a...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
445
VMScore
CVE-2003-0775
saned in sane-backends 1.0.7 and previous versions calls malloc with an arbitrary size value if a connection is dropped before the size value has been sent, which allows remote malicious users to cause a denial of service (memory consumption or crash).
Sane Sane 1.0.6
Sane Sane 1.0.8
Sane Sane 1.0.5
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.0
Sane Sane 1.0.7 Beta2
Sane Sane-backend 1.0.10
Sane Sane 1.0.9
Sane Sane 1.0.3
Sane Sane 1.0.7
Sane Sane 1.0.2
Sane Sane 1.0.1
Sane Sane 1.0.4
445
VMScore
CVE-2003-0777
saned in sane-backends 1.0.7 and previous versions, when debug messages are enabled, does not properly handle dropped connections, which can prevent strings from being null terminated and cause a denial of service (segmentation fault).
Sane Sane 1.0.6
Sane Sane 1.0.8
Sane Sane 1.0.5
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.0
Sane Sane 1.0.7 Beta2
Sane Sane-backend 1.0.10
Sane Sane 1.0.9
Sane Sane 1.0.3
Sane Sane 1.0.7
Sane Sane 1.0.2
Sane Sane 1.0.1
Sane Sane 1.0.4
445
VMScore
CVE-2003-0778
saned in sane-backends 1.0.7 and previous versions, and possibly later versions, does not properly allocate memory in certain cases, which could allow malicious users to cause a denial of service (memory consumption).
Sane Sane 1.0.6
Sane Sane 1.0.8
Sane Sane 1.0.5
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.0
Sane Sane 1.0.7 Beta2
Sane Sane-backend 1.0.10
Sane Sane 1.0.9
Sane Sane 1.0.3
Sane Sane 1.0.7
Sane Sane 1.0.2
Sane Sane 1.0.1
Sane Sane 1.0.4
383
VMScore
CVE-2012-0862
builtins.c in Xinetd prior to 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote malicious users to bypass intended access restrictions via a request to tcpmux port 1.
Xinetd Xinetd 2.3.7
Xinetd Xinetd 2.3.8
Xinetd Xinetd 2.3.10
Xinetd Xinetd 2.3.6
Xinetd Xinetd 2.3.11
Xinetd Xinetd 2.3.5
Xinetd Xinetd 2.3.12
Xinetd Xinetd
Xinetd Xinetd 2.3.13
Xinetd Xinetd 2.3.9
320
VMScore
CVE-2001-1322
xinetd 2.1.8 and previous versions runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.
Xinetd Xinetd 2.1.8.9 Pre15
Xinetd Xinetd 2.1.8.9 Pre10
Xinetd Xinetd 2.1.8.9 Pre5
Xinetd Xinetd 2.1.8.8
Xinetd Xinetd 2.1.8.9 Pre3
Xinetd Xinetd 2.1.8.9 Pre9
Xinetd Xinetd 2.1.8.9 Pre1
Xinetd Xinetd 2.1.8.9 Pre8
Xinetd Xinetd 2.1.8.8 Pre3
Xinetd Xinetd 2.1.8.9 Pre14
Xinetd Xinetd 2.1.8.9 Pre2
Xinetd Xinetd 2.1.8.9 Pre13
Xinetd Xinetd 2.1.8.9 Pre12
Xinetd Xinetd 2.1.8.9 Pre11
Xinetd Xinetd 2.1.8.9 Pre7
Xinetd Xinetd 2.1.8.9 Pre4
187
VMScore
CVE-2002-0871
xinetd 2.3.4 leaks file descriptors for the signal pipe to services that are launched by xinetd, which could allow those services to cause a denial of service via the pipe.
Xinetd Xinetd 2.3.6
Xinetd Xinetd 2.3.4
Xinetd Xinetd 2.3.5
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2