Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netmask vulnerabilities and exploits
(subscribe to this query)
9.1
CVSSv3
CVE-2021-28918
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote malicious users to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on...
Netmask Project Netmask
1 Article
5.3
CVSSv3
CVE-2021-29418
The netmask package prior to 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows malicious users to bypass access control that is based on IP addresses. NOTE: this issue exists because o...
Netmask Project Netmask
7.5
CVSSv3
CVE-2021-29424
The Net::Netmask module prior to 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows malicious users to bypass access control that is based on IP addresses.
Net\\ \\ Netmask Project
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
NA
CVE-2012-2337
sudo 1.6.x and 1.7.x prior to 1.7.9p1, and 1.8.x prior to 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4...
Todd Miller Sudo 1.6.2p3
Todd Miller Sudo 1.6.3
Todd Miller Sudo 1.6.8
Todd Miller Sudo 1.6.8p12
Todd Miller Sudo 1.6.5
Todd Miller Sudo 1.6.6
Todd Miller Sudo 1.6.9p21
Todd Miller Sudo 1.6.9p22
Todd Miller Sudo 1.6.3 P7
Todd Miller Sudo 1.6.4
Todd Miller Sudo 1.6.4p2
Todd Miller Sudo 1.6.9
Todd Miller Sudo 1.6.9p20
Todd Miller Sudo 1.6.1
Todd Miller Sudo 1.6.2
Todd Miller Sudo 1.6.7
Todd Miller Sudo 1.6.7p5
Todd Miller Sudo 1.6.9p23
Todd Miller Sudo 1.6
NA
CVE-2013-6230
The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV prior to 9.6-ESV-R10-P1, 9.8 prior to 9.8.6-P1, 9.9 prior to 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.2...
Isc Bind 9.9.3
Isc Bind 9.9.0
Isc Bind 9.9.1
Isc Bind 9.8.0
Isc Bind 9.8.1
Isc Bind 9.8.2
Isc Bind 9.8.3
Isc Bind 9.8.5
Isc Bind 9.6
Isc Bind 9.9.2
Isc Bind 9.9.4
Isc Bind 9.8.4
Isc Bind 9.8.6
NA
CVE-2012-0809
Format string vulnerability in the sudo_debug function in Sudo 1.8.0 up to and including 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
Todd Miller Sudo 1.8.0
Todd Miller Sudo 1.8.2
Todd Miller Sudo 1.8.1p2
Todd Miller Sudo 1.8.3p1
Todd Miller Sudo 1.8.3
Todd Miller Sudo 1.8.1p1
Todd Miller Sudo 1.8.1
2 EDB exploits
1 Github repository
NA
CVE-1999-0524
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
Microsoft Windows -
Cisco Ios -
Apple Mac Os X -
Linux Linux Kernel -
Hp Hp-ux -
Ibm Aix -
Apple Macos -
Oracle Solaris -
Novell Netware -
Windriver Bsdos -
Ibm Os2 -
Hp Tru64 -
Sco Sco Unix -
Sgi Irix -
1 Github repository
7.5
CVSSv3
CVE-2020-15052
An issue exists in Artica Proxy CE prior to 4.28.030.418. SQL Injection exists via the Netmask, Hostname, and Alias fields.
Articatech Artica Proxy
1 Github repository
9.8
CVSSv3
CVE-2015-7224
puppetlabs-mysql 3.1.0 up to and including 3.6.0 allow remote malicious users to bypass authentication by leveraging creation of a database account without a password when a 'mysql_user' user parameter contains a host with a netmask.
Puppet Puppetlabs-mysql
NA
CVE-2006-4265
Kaspersky Anti-Hacker 1.8.180, when Stealth Mode is enabled, allows remote malicious users to obtain responses to ICMP (1) timestamp and (2) netmask requests, which is inconsistent with the documented behavior of Stealth Mode.
Kaspersky Lab Kaspersky Anti-hacker 1.8.180
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »