Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcp vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2001-0751
Cisco switches and routers running CBOS 2.3.8 and previous versions use predictable TCP Initial Sequence Numbers (ISN), which allows remote malicious users to spoof or hijack TCP connections.
Cisco Cbos
1 EDB exploit
7.5
CVSSv2
CVE-2001-1104
SonicWALL SOHO uses easily predictable TCP sequence numbers, which allows remote malicious users to spoof or hijack sessions.
Sonicwall Soho Firmware 4.0.0
Sonicwall Soho Firmware 5.0.0
Sonicwall Soho Firmware 5.1.5.0
1 EDB exploit
5
CVSSv2
CVE-2002-2438
TCP firewalls could be circumvented by sending a SYN Packets with other flags (like e.g. RST flag) set, which was not correctly discarded by the Linux TCP stack after firewalling.
Linux Linux Kernel
7.5
CVSSv2
CVE-2004-0641
Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Thomson Speedtouch 510 Adsl Router
1 EDB exploit
5
CVSSv2
CVE-2018-0137
A vulnerability in the TCP throttling process of Cisco Prime Network could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient rate limiting protection for TCP listening ports...
Cisco Prime Network 4.3\\(2.0\\)pp1
Cisco Prime Network 4.3\\(0.0\\)pp6
2.1
CVSSv2
CVE-1999-0451
Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.
Linux Linux Kernel 2.0
Linux Linux Kernel 2.2.0
1 EDB exploit
7.5
CVSSv2
CVE-2002-1463
Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote malicious users to spoof connections...
Symantec Raptor Firewall 6.5
Symantec Raptor Firewall 6.5.3
Symantec Enterprise Firewall 6.5.2
Symantec Enterprise Firewall 7.0
Symantec Velociraptor Model 500
Symantec Velociraptor Model 700
Symantec Velociraptor Model 1200
Symantec Velociraptor Model 1300
Symantec Velociraptor Model 1000
Symantec Velociraptor Model 1100
Symantec Gateway Security 5110
Symantec Gateway Security 5200
Symantec Gateway Security 5300
1 EDB exploit
7.5
CVSSv2
CVE-2000-0916
FreeBSD 4.1.1 and previous versions, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote malicious users to spoof TCP connections.
Freebsd Freebsd 2.0
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.0
1 EDB exploit
7.5
CVSSv2
CVE-2005-1517
Unknown vulnerability in Cisco Firewall Services Module (FWSM) 2.3.1 and previous versions, when using URL, FTP, or HTTPS filtering exceptions, allows certain TCP packets to bypass access control lists (ACLs).
Cisco Firewall Services Module
6.4
CVSSv2
CVE-2003-1230
The implementation of SYN cookies (syncookies) in FreeBSD 4.5 up to and including 5.0-RELEASE-p3 uses only 32-bit internal keys when generating syncookies, which makes it easier for remote malicious users to conduct brute force ISN guessing attacks and spoof legitimate traffic.
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36920
buffer overflow
CVE-2024-36913
CVE-2024-5497
CVE-2024-23917
CVE-2024-4956
server-side request forgery
CVE-2024-35468
SSTI
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »