Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcp vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2006-0230
Symantec Scan Engine 5.0.0.24, and possibly other versions prior to 5.1.0.7, uses a client-side check to verify a password, which allows remote malicious users to gain administrator privileges via a modified client that sends certain XML requests.
Symantec Antivirus Scan Engine 5.0.0.24
1 EDB exploit
1000
VMScore
CVE-2005-2611
VERITAS Backup Exec for Windows Servers 8.6 up to and including 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 up to and including 5.1 uses a static password during authentication from the NDMP agent to the server, which allow...
Symantec Veritas Backup Exec Netware Servers 9.0.4170
Symantec Veritas Backup Exec Netware Servers 9.0.4172
Symantec Veritas Backup Exec Netware Servers 9.1.1152 .4
Symantec Veritas Backup Exec Netware Servers 9.1.1154
Symantec Veritas Backup Exec Windows Servers 8.6
Symantec Veritas Backup Exec Windows Servers 9.0
Symantec Veritas Backup Exec Windows Servers 9.1 Rev. 4691 Sp2
Symantec Veritas Backup Exec Remote Agent Netware Server
Symantec Veritas Netbackup Netware Media Servers 4.5 Fp5
Symantec Veritas Netbackup Netware Media Servers 4.5 Fp6
Symantec Veritas Netbackup Netware Media Servers 4.5 Mp5
Symantec Veritas Netbackup Netware Media Servers 4.5 Mp6
Symantec Veritas Netbackup Netware Media Servers 5.0 Mp4
Symantec Veritas Netbackup Netware Media Servers 5.0 Mp5
Symantec Veritas Netbackup Netware Media Servers 5.1
Symantec Veritas Backup Exec Netware Servers 9.1.1067 .2
Symantec Veritas Backup Exec Netware Servers 9.1.1067 .3
Symantec Veritas Backup Exec Netware Servers 9.1.1127 .1
Symantec Veritas Backup Exec Netware Servers 9.1.307
Symantec Veritas Backup Exec Windows Servers 10.0 Rev. 5484
Symantec Veritas Backup Exec Windows Servers 9.0 Rev. 4454
Symantec Veritas Backup Exec Windows Servers 9.0 Rev. 4454 Sp1
1 EDB exploit
1000
VMScore
CVE-2005-0771
VERITAS Backup Exec Server (beserver.exe) 9.0 up to and including 10.0 for Windows allows remote unauthenticated malicious users to modify the registry by calling methods to the RPC interface on TCP port 6106.
Symantec Veritas Backup Exec 10.0 Rev.5484
Symantec Veritas Backup Exec 9.0 Rev.4367
Symantec Veritas Backup Exec 9.0 Rev.4454
Symantec Veritas Backup Exec 9.1 Rev.4691
1000
VMScore
CVE-2004-1080
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote malicious users to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP ...
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows Nt 4.0
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server 2000
Microsoft Windows 2003 Server 2003
Microsoft Windows 2003 Server R2
2 EDB exploits
1000
VMScore
CVE-2003-0209
Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and previous versions allows remote malicious users to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
Sourcefire Snort 1.8.5
Sourcefire Snort 1.8.6
Smoothwall Smoothwall 2.0 Beta 4
Sourcefire Snort 1.8
Sourcefire Snort 1.8.7
Sourcefire Snort 1.9
Sourcefire Snort 1.8.1
Sourcefire Snort 1.8.2
Sourcefire Snort 1.9.1
Sourcefire Snort 1.8.3
Sourcefire Snort 1.8.4
1 EDB exploit
1000
VMScore
CVE-2003-0085
Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba prior to 2.2.8, and Samba-TNG prior to 0.3.1, allows remote malicious users to execute arbitrary code.
Samba Samba 2.0.1
Samba Samba 2.0.10
Samba Samba 2.0.8
Samba Samba 2.0.9
Samba Samba 2.2.4
Samba Samba 2.2.5
Samba Samba 2.0.2
Samba Samba 2.0.3
Samba Samba 2.2.0
Samba Samba 2.2.0a
Samba Samba 2.2.6
Samba Samba 2.2.7
Samba Samba 2.0.0
Samba Samba 2.0.6
Samba Samba 2.0.7
Samba Samba 2.2.3
Samba Samba 2.2.3a
Samba Samba 2.0.4
Samba Samba 2.0.5
Samba Samba 2.2.1a
Samba Samba 2.2.2
Samba Samba 2.2.7a
3 EDB exploits
1000
VMScore
CVE-2002-0013
Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote malicious users to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test...
Snmp Snmp
1 EDB exploit
1000
VMScore
CVE-2001-0803
Buffer overflow in the client connection routine of libDtSvc.so.1 in CDE Subprocess Control Service (dtspcd) allows remote malicious users to execute arbitrary commands.
Open Group Cde Common Desktop Environment 1.0.1
Open Group Cde Common Desktop Environment 1.2
Open Group Cde Common Desktop Environment 2.0
Open Group Cde Common Desktop Environment 2.1
Open Group Cde Common Desktop Environment 1.0.2
Open Group Cde Common Desktop Environment 1.1
2 EDB exploits
1000
VMScore
CVE-2001-0168
Buffer overflow in AT&T WinVNC (Virtual Network Computing) server 3.3.3r7 and previous versions allows remote malicious users to execute arbitrary commands via a long HTTP GET request when the DebugLevel registry key is greater than 0.
Att Winvnc
1 EDB exploit
1000
VMScore
CVE-2001-0010
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote malicious users to gain root privileges.
Isc Bind 8.2.2
Isc Bind 8.2.1
Isc Bind 8.2
4 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »