Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcp vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2000-0916
FreeBSD 4.1.1 and previous versions, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote malicious users to spoof TCP connections.
Freebsd Freebsd 2.0
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.0
1 EDB exploit
7.5
CVSSv2
CVE-2004-0641
Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Thomson Speedtouch 510 Adsl Router
1 EDB exploit
7.5
CVSSv2
CVE-2007-4827
Unspecified vulnerability in the Modbus/TCP Diagnostic function in MiniHMI.exe for the Automated Solutions Modbus Slave ActiveX Control prior to 1.5 allows remote malicious users to corrupt the heap and possibly execute arbitrary code via malformed Modbus requests to TCP port 502...
Automated Solutions Modbus Slave Activex Control
7.5
CVSSv2
CVE-2001-1104
SonicWALL SOHO uses easily predictable TCP sequence numbers, which allows remote malicious users to spoof or hijack sessions.
Sonicwall Soho Firmware 4.0.0
Sonicwall Soho Firmware 5.0.0
Sonicwall Soho Firmware 5.1.5.0
1 EDB exploit
4.6
CVSSv2
CVE-2001-0163
Cisco AP340 base station produces predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Cisco Aironet Ap340
1 EDB exploit
7.5
CVSSv2
CVE-2001-0751
Cisco switches and routers running CBOS 2.3.8 and previous versions use predictable TCP Initial Sequence Numbers (ISN), which allows remote malicious users to spoof or hijack TCP connections.
Cisco Cbos
1 EDB exploit
7.8
CVSSv2
CVE-2010-2827
Cisco IOS 15.1(2)T allows remote malicious users to cause a denial of service (resource consumption and TCP outage) via spoofed TCP packets, related to embryonic TCP connections that remain in the SYN_RCVD or SYN_SENT state, aka Bug ID CSCti18193.
Cisco Ios 15.1\\(2\\)t
4.3
CVSSv2
CVE-2020-8839
Stored XSS exists on CHIYU BF-430 232/485 TCP/IP Converter devices prior to 1.16.00, as demonstrated by the /if.cgi TF_submask field.
Chiyu-t Bf-430 Firmware
5
CVSSv2
CVE-2002-2438
TCP firewalls could be circumvented by sending a SYN Packets with other flags (like e.g. RST flag) set, which was not correctly discarded by the Linux TCP stack after firewalling.
Linux Linux Kernel
NA
CVE-2021-42146
An issue exists in Contiki-NG tinyDTLS through master branch 53a0d97. DTLS servers allow remote malicious users to reuse the same epoch number within two times the TCP maximum segment lifetime, which is prohibited in RFC6347. This vulnerability allows remote malicious users to ob...
Contiki-ng Tinydtls 2018-08-30
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »