Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcp vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0916
FreeBSD 4.1.1 and previous versions, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote malicious users to spoof TCP connections.
Freebsd Freebsd 2.0
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.0
1 EDB exploit
NA
CVE-2004-0641
Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Thomson Speedtouch 510 Adsl Router
1 EDB exploit
NA
CVE-2007-4827
Unspecified vulnerability in the Modbus/TCP Diagnostic function in MiniHMI.exe for the Automated Solutions Modbus Slave ActiveX Control prior to 1.5 allows remote malicious users to corrupt the heap and possibly execute arbitrary code via malformed Modbus requests to TCP port 502...
Automated Solutions Modbus Slave Activex Control
NA
CVE-2001-1104
SonicWALL SOHO uses easily predictable TCP sequence numbers, which allows remote malicious users to spoof or hijack sessions.
Sonicwall Soho Firmware 4.0.0
Sonicwall Soho Firmware 5.0.0
Sonicwall Soho Firmware 5.1.5.0
1 EDB exploit
NA
CVE-2001-0163
Cisco AP340 base station produces predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Cisco Aironet Ap340
1 EDB exploit
NA
CVE-2001-0751
Cisco switches and routers running CBOS 2.3.8 and previous versions use predictable TCP Initial Sequence Numbers (ISN), which allows remote malicious users to spoof or hijack TCP connections.
Cisco Cbos
1 EDB exploit
NA
CVE-2010-2827
Cisco IOS 15.1(2)T allows remote malicious users to cause a denial of service (resource consumption and TCP outage) via spoofed TCP packets, related to embryonic TCP connections that remain in the SYN_RCVD or SYN_SENT state, aka Bug ID CSCti18193.
Cisco Ios 15.1\\(2\\)t
6.1
CVSSv3
CVE-2020-8839
Stored XSS exists on CHIYU BF-430 232/485 TCP/IP Converter devices prior to 1.16.00, as demonstrated by the /if.cgi TF_submask field.
Chiyu-t Bf-430 Firmware
7.5
CVSSv3
CVE-2002-2438
TCP firewalls could be circumvented by sending a SYN Packets with other flags (like e.g. RST flag) set, which was not correctly discarded by the Linux TCP stack after firewalling.
Linux Linux Kernel
7.5
CVSSv3
CVE-2021-42146
An issue exists in Contiki-NG tinyDTLS through master branch 53a0d97. DTLS servers allow remote malicious users to reuse the same epoch number within two times the TCP maximum segment lifetime, which is prohibited in RFC6347. This vulnerability allows remote malicious users to ob...
Contiki-ng Tinydtls 2018-08-30
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »