Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcp ip vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-1513
The UCX POP server in HP TCP/IP services for OpenVMS 4.2 up to and including 5.3 allows local users to truncate arbitrary files via the -logfile command line option, which overrides file system permissions because the server runs with the SYSPRV and BYPASS privileges.
Compaq Tcp-ip Services 4.2
Compaq Tcp-ip Services 5.0a
Compaq Tcp-ip Services 5.1
Compaq Tcp-ip Services 5.3
1 EDB exploit
NA
CVE-2011-3168
Unspecified vulnerability in the POP and IMAP service implementations in HP TCP/IP Services 5.6 and 5.7 for OpenVMS allows remote malicious users to obtain sensitive information via unknown vectors.
Hp Tcp Ip Services Openvms 5.6
Hp Tcp Ip Services Openvms 5.7
NA
CVE-2011-3169
Unspecified vulnerability in the SMTP service implementation in HP TCP/IP Services 5.6 and 5.7 for OpenVMS allows remote malicious users to cause a denial of service via unknown vectors.
Hp Tcp Ip Services Openvms 5.6
Hp Tcp Ip Services Openvms 5.7
7.5
CVSSv3
CVE-2021-45445
Unisys ClearPath MCP TCP/IP Networking Services 59.1, 60.0, and 62.0 has an Infinite Loop.
Unisys Clearpath Mcp Tcp\\/ip Networking Services 59.1
Unisys Clearpath Mcp Tcp\\/ip Networking Services 60.0
Unisys Clearpath Mcp Tcp\\/ip Networking Services 62.0
9.8
CVSSv3
CVE-2020-25066
A heap-based buffer overflow in the Treck HTTP Server component prior to 6.0.1.68 allows remote malicious users to cause a denial of service (crash/reset) or to possibly execute arbitrary code.
Treck Tcp\\/ip
9.8
CVSSv3
CVE-2020-27630
In Silicon Labs uC/TCP-IP 3.6.0, TCP ISNs are improperly random.
Silabs Uc\\/tcp-ip 3.6.0
NA
CVE-2014-7880
Multiple unspecified vulnerabilities in the POP implementation in HP OpenVMS TCP/IP 5.7 before ECO5 allow remote malicious users to cause a denial of service via unspecified vectors.
Hp Tcp Ip Services Openvms
9.8
CVSSv3
CVE-2020-25928
The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: DNS response processing functions: dns_upcall(), getoffset(), dnc_set_answer(). The attack vector is: a specific DNS response p...
Hcc-embedded Nichestack Tcp\\/ip 4.0.1
7.5
CVSSv3
CVE-2020-25926
The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet.
Hcc-embedded Nichestack Tcp\\/ip 4.0.1
7.5
CVSSv3
CVE-2020-25927
The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Out-of-bounds Read. The impact is: a denial of service (remote). The component is: DNS response processing in function: dns_upcall(). The attack vector is: a specific DNS response packet. The code does not chec...
Hcc-embedded Nichestack Tcp\\/ip 4.0.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »