Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netmask vulnerabilities and exploits
(subscribe to this query)
571
VMScore
CVE-2021-28918
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote malicious users to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on...
Netmask Project Netmask
1 Article
446
VMScore
CVE-2021-29418
The netmask package prior to 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows malicious users to bypass access control that is based on IP addresses. NOTE: this issue exists because o...
Netmask Project Netmask
445
VMScore
CVE-2021-29424
The Net::Netmask module prior to 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows malicious users to bypass access control that is based on IP addresses.
Net\\ \\ Netmask Project
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
641
VMScore
CVE-2012-2337
sudo 1.6.x and 1.7.x prior to 1.7.9p1, and 1.8.x prior to 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4...
Todd Miller Sudo 1.6.2p3
Todd Miller Sudo 1.6.3
Todd Miller Sudo 1.6.8
Todd Miller Sudo 1.6.8p12
Todd Miller Sudo 1.6.5
Todd Miller Sudo 1.6.6
Todd Miller Sudo 1.6.9p21
Todd Miller Sudo 1.6.9p22
Todd Miller Sudo 1.6.3 P7
Todd Miller Sudo 1.6.4
Todd Miller Sudo 1.6.4p2
Todd Miller Sudo 1.6.9
Todd Miller Sudo 1.6.9p20
Todd Miller Sudo 1.6.1
Todd Miller Sudo 1.6.2
Todd Miller Sudo 1.6.7
Todd Miller Sudo 1.6.7p5
Todd Miller Sudo 1.6.9p23
Todd Miller Sudo 1.6
605
VMScore
CVE-2013-6230
The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV prior to 9.6-ESV-R10-P1, 9.8 prior to 9.8.6-P1, 9.9 prior to 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.2...
Isc Bind 9.9.3
Isc Bind 9.9.0
Isc Bind 9.9.1
Isc Bind 9.8.0
Isc Bind 9.8.1
Isc Bind 9.8.2
Isc Bind 9.8.3
Isc Bind 9.8.5
Isc Bind 9.6
Isc Bind 9.9.2
Isc Bind 9.9.4
Isc Bind 9.8.4
Isc Bind 9.8.6
187
VMScore
CVE-1999-0524
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
Microsoft Windows -
Cisco Ios -
Apple Mac Os X -
Linux Linux Kernel -
Hp Hp-ux -
Ibm Aix -
Apple Macos -
Oracle Solaris -
Novell Netware -
Windriver Bsdos -
Ibm Os2 -
Hp Tru64 -
Sco Sco Unix -
Sgi Irix -
1 Github repository
730
VMScore
CVE-2012-0809
Format string vulnerability in the sudo_debug function in Sudo 1.8.0 up to and including 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
Todd Miller Sudo 1.8.0
Todd Miller Sudo 1.8.2
Todd Miller Sudo 1.8.1p2
Todd Miller Sudo 1.8.3p1
Todd Miller Sudo 1.8.3
Todd Miller Sudo 1.8.1p1
Todd Miller Sudo 1.8.1
2 EDB exploits
1 Github repository
445
VMScore
CVE-2020-15052
An issue exists in Artica Proxy CE prior to 4.28.030.418. SQL Injection exists via the Netmask, Hostname, and Alias fields.
Articatech Artica Proxy
1 Github repository
668
VMScore
CVE-2015-7224
puppetlabs-mysql 3.1.0 up to and including 3.6.0 allow remote malicious users to bypass authentication by leveraging creation of a database account without a password when a 'mysql_user' user parameter contains a host with a netmask.
Puppet Puppetlabs-mysql
445
VMScore
CVE-2006-4265
Kaspersky Anti-Hacker 1.8.180, when Stealth Mode is enabled, allows remote malicious users to obtain responses to ICMP (1) timestamp and (2) netmask requests, which is inconsistent with the documented behavior of Stealth Mode.
Kaspersky Lab Kaspersky Anti-hacker 1.8.180
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »