Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xinetd xinetd - vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2022-22164
An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an a...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
10
CVSSv2
CVE-2001-0803
Buffer overflow in the client connection routine of libDtSvc.so.1 in CDE Subprocess Control Service (dtspcd) allows remote malicious users to execute arbitrary commands.
Open Group Cde Common Desktop Environment 1.0.1
Open Group Cde Common Desktop Environment 1.2
Open Group Cde Common Desktop Environment 2.0
Open Group Cde Common Desktop Environment 2.1
Open Group Cde Common Desktop Environment 1.0.2
Open Group Cde Common Desktop Environment 1.1
2 EDB exploits
7.5
CVSSv2
CVE-2003-0774
saned in sane-backends 1.0.7 and previous versions does not quickly handle connection drops, which allows remote malicious users to cause a denial of service (segmentation fault) when invalid memory is accessed.
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.7 Beta2
Sane Sane 1.0.8
Sane Sane 1.0.9
Sane Sane-backend 1.0.10
Sane Sane 1.0.0
Sane Sane 1.0.1
Sane Sane 1.0.2
Sane Sane 1.0.4
Sane Sane 1.0.6
Sane Sane 1.0.3
Sane Sane 1.0.5
Sane Sane 1.0.7
7.5
CVSSv2
CVE-2003-0776
saned in sane-backends 1.0.7 and previous versions does not properly "check the validity of the RPC numbers it gets before getting the parameters," with unknown consequences.
Sane Sane-backend 1.0.10
Sane Sane 1.0.5
Sane Sane 1.0.6
Sane Sane 1.0.7
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.1
Sane Sane 1.0.3
Sane Sane 1.0.8
Sane Sane 1.0.0
Sane Sane 1.0.2
Sane Sane 1.0.4
Sane Sane 1.0.7 Beta2
Sane Sane 1.0.9
5
CVSSv2
CVE-2003-0778
saned in sane-backends 1.0.7 and previous versions, and possibly later versions, does not properly allocate memory in certain cases, which could allow malicious users to cause a denial of service (memory consumption).
Sane Sane 1.0.2
Sane Sane 1.0.3
Sane Sane 1.0.4
Sane Sane 1.0.5
Sane Sane 1.0.8
Sane Sane 1.0.9
Sane Sane 1.0.0
Sane Sane 1.0.7
Sane Sane 1.0.7 Beta2
Sane Sane-backend 1.0.10
Sane Sane 1.0.1
Sane Sane 1.0.6
Sane Sane 1.0.7 Beta1
5
CVSSv2
CVE-2003-0777
saned in sane-backends 1.0.7 and previous versions, when debug messages are enabled, does not properly handle dropped connections, which can prevent strings from being null terminated and cause a denial of service (segmentation fault).
Sane Sane-backend 1.0.10
Sane Sane 1.0.0
Sane Sane 1.0.1
Sane Sane 1.0.2
Sane Sane 1.0.7
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.7 Beta2
Sane Sane 1.0.8
Sane Sane 1.0.3
Sane Sane 1.0.5
Sane Sane 1.0.4
Sane Sane 1.0.6
Sane Sane 1.0.9
7.5
CVSSv2
CVE-2003-0773
saned in sane-backends 1.0.7 and previous versions does not check the IP address of the connecting host during the SANE_NET_INIT RPC call, which allows remote malicious users to use that call even if they are restricted in saned.conf.
Sane Sane 1.0.0
Sane Sane 1.0.1
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.7 Beta2
Sane Sane 1.0.4
Sane Sane 1.0.5
Sane Sane 1.0.2
Sane Sane 1.0.3
Sane Sane 1.0.8
Sane Sane 1.0.9
Sane Sane-backend 1.0.10
Sane Sane 1.0.6
Sane Sane 1.0.7
5
CVSSv2
CVE-2003-0775
saned in sane-backends 1.0.7 and previous versions calls malloc with an arbitrary size value if a connection is dropped before the size value has been sent, which allows remote malicious users to cause a denial of service (memory consumption or crash).
Sane Sane 1.0.8
Sane Sane 1.0.9
Sane Sane 1.0.2
Sane Sane 1.0.3
Sane Sane 1.0.4
Sane Sane 1.0.5
Sane Sane-backend 1.0.10
Sane Sane 1.0.1
Sane Sane 1.0.6
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.0
Sane Sane 1.0.7
Sane Sane 1.0.7 Beta2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2