Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windriver vxworks vulnerabilities and exploits
(subscribe to this query)
829
VMScore
CVE-2015-7599
Integer overflow in the _authenticate function in svc_auth.c in Wind River VxWorks 5.5 up to and including 6.9.4.1, when the Remote Procedure Call (RPC) protocol is enabled, allows remote malicious users to cause a denial of service (crash) or possibly execute arbitrary code via ...
Windriver Vxworks 6.4
Windriver Vxworks 5.5
Windriver Vxworks 6.8
Windriver Vxworks 6.9
Windriver Vxworks
Windriver Vxworks 6.7
3 Github repositories
516
VMScore
CVE-2015-3963
Wind River VxWorks prior to 5.5.1, 6.5.x up to and including 6.7.x prior to 6.7.1.1, 6.8.x prior to 6.8.3, 6.9.x prior to 6.9.4.4, and 7.x prior to 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP i...
Windriver Vxworks
Windriver Vxworks 6.6.3
Windriver Vxworks 6.6.4
Windriver Vxworks 6.6.4.1
Windriver Vxworks 7.0
694
VMScore
CVE-2010-2966
The INCLUDE_SECURITY functionality in Wind River VxWorks 6.x, 5.x, and previous versions uses the LOGIN_USER_NAME and LOGIN_USER_PASSWORD (aka LOGIN_PASSWORD) parameters to create hardcoded credentials, which makes it easier for remote malicious users to obtain access via a (1) t...
Windriver Vxworks
Windriver Vxworks 5.5
Windriver Vxworks 6.4
Windriver Vxworks 5
Windriver Vxworks 6
694
VMScore
CVE-2010-2967
The loginDefaultEncrypt algorithm in loginLib in Wind River VxWorks prior to 6.9 does not properly support a large set of distinct possible passwords, which makes it easier for remote malicious users to obtain access via a (1) telnet, (2) rlogin, or (3) FTP session.
Windriver Vxworks 5
Windriver Vxworks 6
Windriver Vxworks 5.5
Windriver Vxworks
Windriver Vxworks 6.4
694
VMScore
CVE-2010-2968
The FTP daemon in Wind River VxWorks does not close the TCP connection after a number of failed login attempts, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Windriver Vxworks 5
Windriver Vxworks 6
Windriver Vxworks
Windriver Vxworks 6.4
Windriver Vxworks 5.5
605
VMScore
CVE-2013-0712
IPSSH (aka the SSH server) in Wind River VxWorks 6.5 up to and including 6.9 allows remote authenticated users to cause a denial of service (daemon outage) via a crafted packet.
Windriver Vxworks 6.7
Windriver Vxworks 6.6
Windriver Vxworks 6.8
Windriver Vxworks 6.5
Windriver Vxworks 6.9
890
VMScore
CVE-2013-0714
IPSSH (aka the SSH server) in Wind River VxWorks 6.5 up to and including 6.9 allows remote malicious users to execute arbitrary code or cause a denial of service (daemon hang) via a crafted public-key authentication request.
Windriver Vxworks 6.7
Windriver Vxworks 6.9
Windriver Vxworks 6.8
Windriver Vxworks 6.5
Windriver Vxworks 6.6
356
VMScore
CVE-2013-0715
The WebCLI component in Wind River VxWorks 5.5 up to and including 6.9 allows remote authenticated users to cause a denial of service (CLI session crash) via a crafted command string.
Windriver Vxworks 6.6
Windriver Vxworks 6.7
Windriver Vxworks 6.9
Windriver Vxworks 6.8
Windriver Vxworks 6.5
694
VMScore
CVE-2013-0711
IPSSH (aka the SSH server) in Wind River VxWorks 6.5 up to and including 6.9 allows remote malicious users to cause a denial of service (daemon outage) via a crafted authentication request.
Windriver Vxworks 6.6
Windriver Vxworks 6.7
Windriver Vxworks 6.9
Windriver Vxworks 6.8
Windriver Vxworks 6.5
605
VMScore
CVE-2013-0713
IPSSH (aka the SSH server) in Wind River VxWorks 6.5 up to and including 6.9 allows remote authenticated users to cause a denial of service (daemon outage) via a crafted pty request.
Windriver Vxworks 6.8
Windriver Vxworks 6.6
Windriver Vxworks 6.5
Windriver Vxworks 6.7
Windriver Vxworks 6.9
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »