Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcp vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2001-0288
Cisco switches and routers running IOS 12.1 and previous versions produce predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Cisco Ios
1 EDB exploit
383
VMScore
CVE-2020-8839
Stored XSS exists on CHIYU BF-430 232/485 TCP/IP Converter devices prior to 1.16.00, as demonstrated by the /if.cgi TF_submask field.
Chiyu-t Bf-430 Firmware
668
VMScore
CVE-2007-4827
Unspecified vulnerability in the Modbus/TCP Diagnostic function in MiniHMI.exe for the Automated Solutions Modbus Slave ActiveX Control prior to 1.5 allows remote malicious users to corrupt the heap and possibly execute arbitrary code via malformed Modbus requests to TCP port 502...
Automated Solutions Modbus Slave Activex Control
755
VMScore
CVE-2000-0916
FreeBSD 4.1.1 and previous versions, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote malicious users to spoof TCP connections.
Freebsd Freebsd 2.0
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.0
1 EDB exploit
465
VMScore
CVE-2001-0163
Cisco AP340 base station produces predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Cisco Aironet Ap340
1 EDB exploit
505
VMScore
CVE-2000-0463
BeOS 5.0 allows remote malicious users to cause a denial of service via fragmented TCP packets.
Be Beos 5.0
1 EDB exploit
694
VMScore
CVE-2010-2827
Cisco IOS 15.1(2)T allows remote malicious users to cause a denial of service (resource consumption and TCP outage) via spoofed TCP packets, related to embryonic TCP connections that remain in the SYN_RCVD or SYN_SENT state, aka Bug ID CSCti18193.
Cisco Ios 15.1\\(2\\)t
505
VMScore
CVE-2012-5344
Directory traversal vulnerability in the WebServer (Thttpd.bat) in IpTools (aka Tiny TCP/IP server) 0.1.4 allows remote malicious users to read arbitrary files via a .. (dot dot) in a HTTP request.
Kepler Lam Iptools 0.1.4
1 EDB exploit
755
VMScore
CVE-2004-0641
Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Thomson Speedtouch 510 Adsl Router
1 EDB exploit
505
VMScore
CVE-2005-1184
The TCP/IP stack in multiple operating systems allows remote malicious users to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NO...
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows Nt 4.0
Microsoft Windows 2003 Server R2
Microsoft Windows 98se
Microsoft Windows Xp
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Web
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »