Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xinetd xinetd - vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2017-12477
It exists that the bpserverd proprietary protocol in Unitrends Backup (UB) prior to 10.0.0, as invoked through xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue to execute arbitrary commands with root privilege on the target ...
Kaseya Unitrends Backup
2 EDB exploits
1000
VMScore
CVE-2001-0803
Buffer overflow in the client connection routine of libDtSvc.so.1 in CDE Subprocess Control Service (dtspcd) allows remote malicious users to execute arbitrary commands.
Open Group Cde Common Desktop Environment 1.0.1
Open Group Cde Common Desktop Environment 1.2
Open Group Cde Common Desktop Environment 2.0
Open Group Cde Common Desktop Environment 1.0.2
Open Group Cde Common Desktop Environment 2.1
Open Group Cde Common Desktop Environment 1.1
2 EDB exploits
890
VMScore
CVE-2001-0825
Buffer overflow in internal string handling routines of xinetd prior to 2.1.8.8 allows remote malicious users to execute arbitrary commands via a length argument of zero or less, which disables the length check.
Xinetd Xinetd
Xinetd Xinetd 2.1.8.8
Xinetd Xinetd 2.1.8.9
Xinetd Xinetd 2.3.0
755
VMScore
CVE-2001-0763
Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and previous versions may allow remote malicious users to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.
Suse Suse Linux 6.2
Debian Debian Linux
Suse Suse Linux 7.2
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 6.3
Suse Suse Linux 6.4
1 EDB exploit
676
VMScore
CVE-2013-4342
xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote malicious users to gain privileges by leveraging another vulnerability in a service.
Xinetd Xinetd -
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 5
668
VMScore
CVE-2003-0773
saned in sane-backends 1.0.7 and previous versions does not check the IP address of the connecting host during the SANE_NET_INIT RPC call, which allows remote malicious users to use that call even if they are restricted in saned.conf.
Sane Sane 1.0.6
Sane Sane 1.0.8
Sane Sane 1.0.5
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.0
Sane Sane 1.0.7 Beta2
Sane Sane-backend 1.0.10
Sane Sane 1.0.9
Sane Sane 1.0.3
Sane Sane 1.0.7
Sane Sane 1.0.2
Sane Sane 1.0.1
Sane Sane 1.0.4
668
VMScore
CVE-2003-0774
saned in sane-backends 1.0.7 and previous versions does not quickly handle connection drops, which allows remote malicious users to cause a denial of service (segmentation fault) when invalid memory is accessed.
Sane Sane 1.0.6
Sane Sane 1.0.8
Sane Sane 1.0.5
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.0
Sane Sane 1.0.7 Beta2
Sane Sane-backend 1.0.10
Sane Sane 1.0.9
Sane Sane 1.0.3
Sane Sane 1.0.7
Sane Sane 1.0.2
Sane Sane 1.0.1
Sane Sane 1.0.4
668
VMScore
CVE-2003-0776
saned in sane-backends 1.0.7 and previous versions does not properly "check the validity of the RPC numbers it gets before getting the parameters," with unknown consequences.
Sane Sane 1.0.6
Sane Sane 1.0.8
Sane Sane 1.0.5
Sane Sane 1.0.7 Beta1
Sane Sane 1.0.0
Sane Sane 1.0.7 Beta2
Sane Sane-backend 1.0.10
Sane Sane 1.0.9
Sane Sane 1.0.3
Sane Sane 1.0.7
Sane Sane 1.0.2
Sane Sane 1.0.1
Sane Sane 1.0.4
668
VMScore
CVE-2001-1389
Multiple vulnerabilities in xinetd 2.3.0 and previous versions, and additional variants until 2.3.3, may allow remote malicious users to cause a denial of service or execute arbitrary code, primarily via buffer overflows or improper NULL termination.
Xinetd Xinetd 2.1.8.9 Pre15
Xinetd Xinetd 2.1.8.9 Pre10
Xinetd Xinetd 2.1.8.9 Pre5
Xinetd Xinetd 2.1.8.8
Xinetd Xinetd 2.1.8.9 Pre3
Xinetd Xinetd 2.3.0
Xinetd Xinetd 2.1.8.9 Pre9
Xinetd Xinetd 2.1.8.9 Pre1
Xinetd Xinetd 2.1.8.9 Pre8
Xinetd Xinetd 2.1.8.8 Pre3
Xinetd Xinetd 2.1.8.9 Pre14
Xinetd Xinetd 2.1.8.9 Pre2
Xinetd Xinetd 2.1.8.9 Pre13
Xinetd Xinetd 2.1.8.9 Pre12
Xinetd Xinetd 2.1.8.9 Pre11
Xinetd Xinetd 2.1.8.9 Pre7
668
VMScore
CVE-2000-0536
xinetd 2.1.8.x does not properly restrict connections if hostnames are used for access control and the connecting host does not have a reverse DNS entry.
Xinetd Xinetd 2.1.88 Pre2
Xinetd Xinetd 2.1.88 Pre1
Xinetd Xinetd 2.1.89 Pre3
Xinetd Xinetd 2.1.89 Pre4
Xinetd Xinetd 2.1.89 Pre2
Xinetd Xinetd 2.1.89 Pre1
Xinetd Xinetd 2.1.89 Pre5
Xinetd Xinetd 2.1.87
Xinetd Xinetd 2.1.88
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »