Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcp vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2000-0917
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote malicious users to execute arbitrary commands.
Caldera Openlinux Ebuilder 3.0
Caldera Openlinux Eserver 2.3
Redhat Linux 7.0
Caldera Openlinux
Caldera Openlinux Edesktop 2.4
Trustix Secure Linux 1.0
Trustix Secure Linux 1.1
4 EDB exploits
1000
VMScore
CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 4.0
Conectiva Linux 4.0es
Debian Debian Linux 2.2
Debian Debian Linux 2.3
Redhat Linux 6.1
Suse Suse Linux 6.4
Redhat Linux 6.2
Suse Suse Linux 7.0
Redhat Linux 6.0
Suse Suse Linux 6.3
Trustix Secure Linux 1.0
Trustix Secure Linux 1.1
3 EDB exploits
1000
VMScore
CVE-1999-1588
Buffer overflow in nlps_server in Sun Solaris x86 2.4, 2.5, and 2.5.1 allows remote malicious users to execute arbitrary code as root via a long string beginning with "NLPS:002:002:" to the listen (aka System V listener) port, TCP port 2766.
Sun Solaris 2.5
Sun Solaris 2.4
Sun Solaris 2.5.1
1 EDB exploit
1000
VMScore
CVE-1999-0426
The default permissions of /dev/kmem in Linux versions prior to 2.0.36 allows IP spoofing.
Suse Suse Linux 6.0
1 EDB exploit
1 Github repository
1000
VMScore
CVE-1999-0661
A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8...
1 EDB exploit
990
VMScore
CVE-2007-5243
Multiple stack-based buffer overflows in Borland InterBase LI 8.0.0.53 up to and including 8.1.0.253, and WI 5.1.1.680 up to and including 8.1.0.257, allow remote malicious users to execute arbitrary code via (1) a long service attach request on TCP port 3050 to the (a) SVC_attac...
Borland Software Interbase Wi-o6.0.2.0
Borland Software Interbase Wi-v5.1.1.680
Borland Software Interbase Wi-v7.5.1.80
Borland Software Interbase Wi-v8.0.0.123
Borland Software Interbase Li 8.0.0.253
Borland Software Interbase Li 8.0.0.53
Borland Software Interbase Wi-v6.0.1.0
Borland Software Interbase Wi-v6.0.1.6
Borland Software Interbase Li 8.0.0.54
Borland Software Interbase Wi-o6.0.1.6
Borland Software Interbase Wi-v6.5.0.28
Borland Software Interbase Wi-v7.0.1.1
Borland Software Interbase Wi-v7.5.0.129
Borland Software Interbase Wi-v5.5.0.742
Borland Software Interbase Wi-v6.0.0.627
Borland Software Interbase Wi 5.1.1.680
Borland Software Interbase Wi 8.1.0.257
12 EDB exploits
940
VMScore
CVE-2012-3815
Buffer overflow in RunTime.exe in Sielco Sistemi Winlog Pro SCADA prior to 2.07.18 and Winlog Lite SCADA prior to 2.07.18 allows remote malicious users to execute arbitrary code via a crafted packet to TCP port 46824. NOTE: some of these details are obtained from third party info...
Sielcosistemi Winlog Pro 2.07.01
Sielcosistemi Winlog Pro 2.07.00
Sielcosistemi Winlog Pro 2.06.25
Sielcosistemi Winlog Pro 2.06.21
Sielcosistemi Winlog Pro 2.06.09
Sielcosistemi Winlog Pro 2.06.06
Sielcosistemi Winlog Lite 2.07.00
Sielcosistemi Winlog Lite 2.06.60
Sielcosistemi Winlog Lite 2.06.40
Sielcosistemi Winlog Lite 2.06.24
Sielcosistemi Winlog Lite 2.06.09
Sielcosistemi Winlog Lite 2.06.06
Sielcosistemi Winlog Pro
Sielcosistemi Winlog Pro 2.07.11
Sielcosistemi Winlog Pro 2.06.86
Sielcosistemi Winlog Pro 2.06.46
Sielcosistemi Winlog Pro 2.06.18
Sielcosistemi Winlog Pro 2.06.13
Sielcosistemi Winlog Pro 2.06.00
Sielcosistemi Winlog Lite 2.07.11
Sielcosistemi Winlog Lite 2.06.73
Sielcosistemi Winlog Lite 2.07.01
2 EDB exploits
940
VMScore
CVE-2011-0517
Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and previous versions, when Run TCP/IP server is enabled, allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.
Sielcosistemi Winlog Pro
2 EDB exploits
940
VMScore
CVE-2010-1807
WebKit in Apple Safari 4.x prior to 4.1.2 and 5.x prior to 5.0.2; Android prior to 2.2; and webkitgtk prior to 1.2.6; does not properly validate floating-point data, which allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via...
Apple Safari 4.0.5
Apple Safari 4.1
Apple Safari 4.0.0b
Apple Safari 4.1.1
Apple Safari 4.0
Apple Safari 4.0.3
Apple Safari 4.0.4
Apple Safari 4.0.1
Apple Safari 4.0.2
Apple Safari 5.0.1
Apple Safari 5.0
Google Android
Google Android 1.6
Google Android 1.5
Google Android 2.0
Google Android 1.1
Google Android 1.0
Webkitgtk Webkitgtk 1.2.0
Webkitgtk Webkitgtk 1.2.2
Webkitgtk Webkitgtk 1.2.1
Webkitgtk Webkitgtk 1.2.4
Webkitgtk Webkitgtk 1.2.3
2 EDB exploits
940
VMScore
CVE-2007-5244
Stack-based buffer overflow in Borland InterBase LI 8.0.0.53 up to and including 8.1.0.253 on Linux, and possibly unspecified versions on Solaris, allows remote malicious users to execute arbitrary code via a long attach request on TCP port 3050 to the open_marker_file function.
Borland Software Interbase Li 8.0.0.253
Borland Software Interbase Li 8.0.0.53
Borland Software Interbase Li 8.0.0.54
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »