All Systems Operational

CVE Hub

beta
CVE-2024-8785
CRITICAL [9.8]
Last Modified: 12/9/2024
In WhatsUp Gold versions released before 2024.0.1, a remote unauthenticated attacker could leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\.
community.progress.com logo
https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024
docs.progress.com logo
https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html
progress.com logo
https://www.progress.com/network-monitoring
CVE-2024-4883
remote code execution
CRITICAL [9.8]
Last Modified: 11/21/2024
In WhatsUp Gold versions released before 2023.1.3, a Remote Code Execution issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through NmApi.exe.
community.progress.com logo
https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024
community.progress.com logo
https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024
progress.com logo
https://www.progress.com/network-monitoring
+1
CVE-2024-23584
MEDIUM [6.6]
Last Modified: 11/21/2024
The NMAP Importer service​ may expose data store credentials to authorized users of the Windows Registry.
support.hcltechsw.com logo
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0112264
support.hcltechsw.com logo
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0112264
CVE-2023-48310
denial of service
CRITICAL [9.1]
Last Modified: 11/21/2024
TestingPlatform is a testing platform for Internet Security Standards. Prior to version 2.1.1, user input is not filtered correctly. Nmap options are accepted. In this particular case, the option to create log files is accepted in addition to a host name (and even without). A log file is created at the location specified. These files are created as root. If the file exists, the existing file is being rendered useless. This can result in denial of service. Additionally, input for scanning can be any CIDR blocks passed to nmap. An attacker can scan 0.0.0.0/0 or even local networks. Version 2.1.1 contains a patch for this issue.
github.com logo
https://github.com/NC3-LU/TestingPlatform/commit/7b3e7ca869a4845aa7445f874c22c5929315c3a7
github.com logo
https://github.com/NC3-LU/TestingPlatform/releases/tag/v2.1.1
github.com logo
https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6
+5
CVE-2022-48252
command injection
CRITICAL [9.8]
Last Modified: 11/21/2024
The jokob-sk/Pi.Alert fork (before 22.12.20) of Pi.Alert allows Remote Code Execution via nmap_scan.php (scan parameter) OS Command Injection.
github.com logo
https://github.com/jokob-sk/Pi.Alert/security/advisories/GHSA-vhg3-f6gv-j89r
github.com logo
https://github.com/jokob-sk/Pi.Alert/security/advisories/GHSA-vhg3-f6gv-j89r
CVE-2022-38772
remote code execution
HIGH [8.8]
Last Modified: 11/21/2024
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature.
manageengine.com logo
https://manageengine.com
manageengine.com logo
https://www.manageengine.com/itom/advisory/cve-2022-38772.html
manageengine.com logo
https://manageengine.com
+1
CVE-2021-3254
denial of service
HIGH [7.5]
Last Modified: 11/21/2024
Asus DSL-N14U-B1 1.1.2.3_805 allows remote attackers to cause a Denial of Service (DoS) via a TCP SYN scan using nmap.
github.com logo
https://github.com/kaisersource/kaisersource.github.io/blob/main/_posts/2021-01-22-dsl-n14u.md
github.com logo
https://github.com/kaisersource/kaisersource.github.io/blob/main/_posts/2021-01-22-dsl-n14u.md
kaisersource.github.io logo
https://kaisersource.github.io/dsl-n14u-syn
+1
CVE-2022-30284
command execution
CRITICAL [9.0]
Last Modified: 11/21/2024
In the python-libnmap package through 0.7.2 for Python, remote command execution can occur (if used in a client application that does not validate arguments). NOTE: the vendor believes it would be unrealistic for an application to call NmapProcess with arguments taken from input data that arrived over an untrusted network, and thus the CVSS score corresponds to an unrealistic use case. None of the NmapProcess documentation implies that this is an expected use case
github.com logo
https://github.com/savon-noir/python-libnmap/releases
github.com logo
https://github.com/savon-noir/python-libnmap/releases
libnmap.readthedocs.io logo
https://libnmap.readthedocs.io/en/latest/process.html#using-libnmap-process
+5
CVE-2021-41316
HIGH [8.1]
Last Modified: 11/21/2024
The Device42 Main Appliance before 17.05.01 does not sanitize user input in its Nmap Discovery utility. An attacker (with permissions to add or edit jobs run by this utility) can inject an extra argument to overwrite arbitrary files as the root user on the Remote Collector.
blog.device42.com logo
https://blog.device42.com/2021/09/critical-fixes-in-17-05-01/
blog.device42.com logo
https://blog.device42.com/2021/09/critical-fixes-in-17-05-01/
docs.device42.com logo
https://docs.device42.com/auto-discovery/nmap-autodiscovery/
+3
CVE-2020-27403
information disclosure
MEDIUM [6.5]
Last Modified: 11/21/2024
A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows an attacker on the adjacent network to arbitrarily browse and download sensitive files over an insecure web server running on port 7989 that lists all files & directories. An unprivileged remote attacker on the adjacent network, can download most system files, leading to serious critical information disclosure. Also, some TV models and/or FW versions may expose the webserver with the entire filesystem accessible on another port. For example, nmap scan for all ports run directly from the TV model U43P6046 (Android 8.0) showed port 7983 not mentioned in the original CVE description, but containing the same directory listing of the entire filesystem. This webserver is bound (at least) to localhost interface and accessible freely to all unprivileged installed apps on the Android such as a regular web browser. Any app can therefore read any files of any other apps including Android system settings including sensitive data such as saved passwords, private keys etc.
github.com logo
https://github.com/sickcodes
github.com logo
https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-009.md
github.com logo
https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_GlobalFAQ.pdf
+17
CVE-2020-27887
HIGH [8.8]
Last Modified: 11/21/2024
An issue was discovered in EyesOfNetwork 5.3 through 5.3-8. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the nmap_binary parameter to lilac/autodiscovery.php.
github.com logo
https://github.com/EyesOfNetworkCommunity/eonweb/issues/76
github.com logo
https://github.com/EyesOfNetworkCommunity/eonweb/issues/76
download.eyesofnetwork.com logo
http://download.eyesofnetwork.com/EyesOfNetwork-5.3-x86_64-bin.iso
+3
CVE-2020-8655
privilege escalation
HIGH [7.8]
Last Modified: 11/21/2024
An issue was discovered in EyesOfNetwork 5.3. The sudoers configuration is prone to a privilege escalation vulnerability, allowing the apache user to run arbitrary commands as root via a crafted NSE script for nmap 7.
github.com logo
https://github.com/EyesOfNetworkCommunity/eonconf/issues/8
github.com logo
https://github.com/EyesOfNetworkCommunity/eonconf/issues/8
packetstormsecurity.com logo
http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html
+3
CVE-2020-7954
privilege escalation
HIGH [7.8]
Last Modified: 11/21/2024
An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo.
medium.com logo
https://medium.com/%40ph0rensic
medium.com logo
https://medium.com/%40ph0rensic/three-cves-on-opmon-3ca775a262f5
medium.com logo
https://medium.com/%40ph0rensic
+1
CVE-2017-18594
denial of service
HIGH [7.5]
Last Modified: 11/21/2024
nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
github.com logo
https://github.com/AMatchandaHaystack/Research/blob/master/Nmap%26libsshDF
github.com logo
https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad
github.com logo
https://github.com/nmap/nmap/issues/1077
+13
CVE-2019-15506
information disclosure
HIGH [7.5]
Last Modified: 11/21/2024
An issue was discovered in Kaseya Virtual System Administrator (VSA) through 9.4.0.37. It has a critical information disclosure vulnerability. An unauthenticated attacker can send properly formatted requests to the web application and download sensitive files and information. For example, the /DATAREPORTS directory can be farmed for reports. Because this directory contains the results of reports such as NMAP, Patch Status, and Active Directory domain metadata, an attacker can easily collect this critical information and parse it for information. There are a number of directories affected.
dfdrconsulting.com logo
http://dfdrconsulting.com/2019/cyber-security/cve-2019-15506-kaseya-vsa-critical-information-disclosure-unauthenticated-access/
dfdrconsulting.com logo
http://dfdrconsulting.com/2019/cyber-security/cve-2019-15506-kaseya-vsa-critical-information-disclosure-unauthenticated-access/
help.kaseya.com logo
http://help.kaseya.com/WebHelp/EN/RN/index.asp#VSAReleaseNotes.htm
+1
CVE-2018-17228
CRITICAL [9.8]
Last Modified: 11/21/2024
nmap4j 1.1.0 allows attackers to execute arbitrary commands via shell metacharacters in an includeHosts call.
github.com logo
https://github.com/narkisr/nmap4j/issues/9
github.com logo
https://github.com/narkisr/nmap4j/issues/9
CVE-2018-15173
denial of service
HIGH [7.5]
Last Modified: 11/21/2024
Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service.
code610.blogspot.com logo
http://code610.blogspot.com/2018/07/crashing-nmap-760.html
code610.blogspot.com logo
http://code610.blogspot.com/2018/07/crashing-nmap-770.html
code610.blogspot.com logo
http://code610.blogspot.com/2018/07/crashing-nmap-760.html
+9
CVE-2018-8939
ssrf
CRITICAL [9.8]
Last Modified: 11/21/2024
An SSRF issue was discovered in NmAPI.exe in Ipswitch WhatsUp Gold before 2018 (18.0). Malicious actors can submit specially crafted requests via the NmAPI executable to (1) gain unauthorized access to the WhatsUp Gold system, (2) obtain information about the WhatsUp Gold system, or (3) execute remote commands.
docs.ipswitch.com logo
https://docs.ipswitch.com/NM/WhatsUpGold2018/01_ReleaseNotes/index.htm
docs.ipswitch.com logo
https://docs.ipswitch.com/NM/WhatsUpGold2018/01_ReleaseNotes/index.htm
CVE-2018-1000161
directory traversal
MEDIUM [5.7]
Last Modified: 11/21/2024
nmap version 6.49BETA6 through 7.60, up to and including SVN revision 37147 contains a Directory Traversal vulnerability in NSE script http-fetch that can result in file overwrite as the user is running it. This attack appears to be exploitable via a victim that runs NSE script http-fetch against a malicious web site. This vulnerability appears to have been fixed in 7.7.
nmap.org logo
https://nmap.org/changelog.html
nmap.org logo
https://nmap.org/changelog.html
CVE-2015-4045
MEDIUM [6.7]
Last Modified: 11/21/2024
The sudoers file in the asset discovery scanner in AlienVault OSSIM before 5.0.1 allows local users to gain privileges via a crafted nmap script.
alienvault.com logo
https://www.alienvault.com/forums/discussion/5127/
alienvault.com logo
https://www.alienvault.com/forums/discussion/5127/
securityfocus.com logo
http://www.securityfocus.com/bid/74791
+3
CVE-2013-4885
directory traversal
MEDIUM [6.8]
Last Modified: 11/21/2024
The http-domino-enum-passwords.nse script in NMap before 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.
github.com logo
https://github.com/drk1wi/portspoof/commit/1791fe4e2b9e5b5c8e000551ab60a64a29d924c3
github.com logo
https://github.com/drk1wi/portspoof/commit/1791fe4e2b9e5b5c8e000551ab60a64a29d924c3
lists.opensuse.org logo
http://lists.opensuse.org/opensuse-updates/2013-10/msg00030.html
+9
CVE-2013-1190
denial of service
MEDIUM [5.0]
Last Modified: 11/21/2024
The C-Series Rack Server component 1.4 in Cisco Unified Computing System (UCS) does not properly restrict inbound access to ports, which allows remote attackers to cause a denial of service (Integrated Management Controller reboot or hang) via crafted packets, as demonstrated by nmap, aka Bug ID CSCtx19850.
tools.cisco.com logo
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1190
tools.cisco.com logo
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1190
CVE-2006-6404
denial of service
MEDIUM [5.0]
Last Modified: 11/21/2024
INNOVATION Data Processing FDR/UPSTREAM 3.3.0 (GA Oct 2003) allows remote attackers to cause a denial of service (service outage) via a sequence of TCP SYN packets to many ports, as demonstrated using nmap. NOTE: the vendor's testing reportedly found that no denial of service occurred.
attrition.org logo
http://www.attrition.org/pipermail/vim/2009-October/002278.html
attrition.org logo
http://www.attrition.org/pipermail/vim/2009-October/002278.html
osvdb.org logo
http://osvdb.org/ref/30/30782-fdr_portscan.txt
+3
CVE-2008-7201
denial of service
HIGH [7.8]
Last Modified: 11/21/2024
Lantronix MSS485-T allows remote attackers to cause a denial of service (unstable performance and service loss) via certain vulnerability scans, as demonstrated using (1) Nessus and (2) nmap.
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/fulldisclosure/2008-01/0487.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/fulldisclosure/2008-01/0487.html
osvdb.org logo
http://osvdb.org/51003
+1
CVE-2008-0330
denial of service
HIGH [7.8]
Last Modified: 11/21/2024
Open System Consultants (OSC) Radiator before 4.0 allows remote attackers to cause a denial of service (daemon crash) via malformed RADIUS requests, as demonstrated by packets sent by nmap.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/39730
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/40664
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/39730
+9
CVE-2007-4360
denial of service
MEDIUM [4.3]
Last Modified: 11/21/2024
Unspecified vulnerability in Dell Remote Access Card 4 (DRAC4) with firmware 1.50 Build 02.16 allows remote attackers to cause a denial of service (SSH daemon crash) via certain network traffic, as demonstrated by an "nmap -O" scan with nmap 4.03, possibly related to a Mocana (Mocanada) SSH vulnerability.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/35998
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/35998
ftp.us.dell.com logo
ftp://ftp.us.dell.com/sysman/readme_160_A00.txt
+13
CVE-2006-6411
denial of service
HIGH [7.8]
Last Modified: 11/21/2024
PhoneCtrl.exe in Linksys WIP 330 Wireless-G IP Phone 1.00.06A allows remote attackers to cause a denial of service (crash) via a TCP SYN scan, as demonstrated using TCP ports 1-65535 with nmap.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/30771
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/30771
lists.grok.org.uk logo
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051140.html
+11
CVE-2005-4220
denial of service
HIGH [7.8]
Last Modified: 11/21/2024
Netgear RP114, and possibly other versions and devices, allows remote attackers to cause a denial of service via a SYN flood attack between one system on the internal interface and another on the external interface, which temporarily stops routing between the interfaces, as demonstrated using nmap.
secunia.com logo
http://secunia.com/advisories/11698/
secunia.com logo
http://secunia.com/advisories/11698/
securityfocus.com logo
http://www.securityfocus.com/archive/1/419243/100/0/threaded
+7
CVE-2005-2469
buffer overflow
MEDIUM [4.6]
Last Modified: 11/20/2024
Stack-based buffer overflow in the NMAP Agent for Novell NetMail 3.52C and possibly earlier versions allows local users to execute arbitrary code via a long user name in the USER command.
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0299.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0299.html
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/22727
+17
CVE-1999-1373
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
FORE PowerHub before 5.0.1 allows remote attackers to cause a denial of service (hang) via a TCP SYN scan with TCP/IP OS fingerprinting, e.g. via nmap.
marc.info logo
http://marc.info/?l=bugtraq&m=91651770130771&w=2
marc.info logo
http://marc.info/?l=bugtraq&m=91651770130771&w=2
CVE-2004-2298
MEDIUM [6.4]
Last Modified: 11/20/2024
Novell Internet Messaging System (NIMS) 2.6 and 3.0, and NetMail 3.1 and 3.5, is installed with a default NMAP authentication credential, which allows remote attackers to read and write mail store data if the administrator does not change the credential by using the NMAP Credential Generator.
osvdb.org logo
http://www.osvdb.org/12234
osvdb.org logo
http://www.osvdb.org/12234
secunia.com logo
http://secunia.com/advisories/13377
+3
CVE-2003-1223
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
The Node Manager for BEA WebLogic Express and Server 6.1 through 8.1 SP 1 allows remote attackers to cause a denial of service (Node Manager crash) via malformed data to the Node Manager's port, as demonstrated by nmap.
dev2dev.bea.com logo
http://dev2dev.bea.com/pub/advisory/48
dev2dev.bea.com logo
http://dev2dev.bea.com/pub/advisory/48
securityfocus.com logo
http://www.securityfocus.com/bid/9034
+1
CVE-2003-1250
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
Efficient Networks 5861 DSL router, when running firmware 5.3.80 configured to block incoming TCP SYN, packets allows remote attackers to cause a denial of service (crash) via a flood of TCP SYN packets to the WAN interface using a port scanner such as nmap.
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0015.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0015.html
iss.net logo
http://www.iss.net/security_center/static/11032.php
+11
CVE-2002-2179
denial of service
HIGH [7.8]
Last Modified: 11/20/2024
The dynamic initialization feature of the ClearPath MCP environment allows remote attackers to cause a denial of service (crash) via a TCP port scan using a tool such as nmap.
iss.net logo
http://www.iss.net/security_center/static/10260.php
iss.net logo
http://www.iss.net/security_center/static/10260.php
securityfocus.com logo
http://www.securityfocus.com/archive/1/293881
+5
CVE-2002-1944
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
Motorola Surfboard 4200 cable modem allows remote attackers to cause a denial of service (crash) by performing a SYN scan using a tool such as nmap.
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2002-10/0429.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2002-10/0429.html
iss.net logo
http://www.iss.net/security_center/static/10513.php
+1
CVE-2002-2116
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
Netgear RM-356 and RT-338 series SOHO routers allow remote attackers to cause a denial of service (crash) via a UDP port scan, as demonstrated using nmap.
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2002-02/0162.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2002-02/0183.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2002-02/0162.html
+5
CVE-2002-2003
MEDIUM [5.0]
Last Modified: 11/20/2024
ypbind in Compaq Tru64 4.0F, 4.0G, 5.0A, 5.1 and 5.1A allows remote attackers to cause the process to core dump via certain network packets generated by nmap.
ftp.support.compaq.com logo
http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml
ftp.support.compaq.com logo
http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml
CVE-2002-2071
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
Compaq Tru64 4.0 d allows remote attackers to cause a denial of service in (1) telnet, (2) FTP, (3) ypbind, (4) rpc.lockd, (5) snmp, (6) ttdbserverd, and possibly other services via a TCP SYN scan, as demonstrated using nmap.
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2002-01/0357.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2002-01/0357.html
iss.net logo
http://www.iss.net/security_center/static/8040.php
+3
CVE-2002-1322
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
Rational ClearCase 4.1, 2002.05, and possibly other versions allows remote attackers to cause a denial of service (crash) via certain packets to port 371, e.g. via nmap.
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0084.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0084.html
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/10675
+5
CVE-2002-0116
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
Palm OS 3.5h and possibly other versions, as used in Handspring Visor and Xircom products, allows remote attackers to cause a denial of service via a TCP connect scan, e.g. from nmap.
iss.net logo
http://www.iss.net/security_center/static/7865.php
iss.net logo
http://www.iss.net/security_center/static/7865.php
marc.info logo
http://marc.info/?l=bugtraq&m=101069677929208&w=2
+5
CVE-2002-0119
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
Alcatel Speed Touch Home ADSL Modem allows remote attackers to cause a denial of service (reboot) via a network scan with unusual packets, such as nmap with OS detection.
iss.net logo
http://www.iss.net/security_center/static/7893.php
iss.net logo
http://www.iss.net/security_center/static/7893.php
online.securityfocus.com logo
http://online.securityfocus.com/archive/1/249746
+3
CVE-2001-0896
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
Inetd in OpenServer 5.0.5 allows remote attackers to cause a denial of service (crash) via a port scan, e.g. with nmap -PO.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/7571
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/7571
marc.info logo
http://marc.info/?l=bugtraq&m=101284101228656&w=2
+5
CVE-2000-1226
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
Snort 1.6, when running in straight ASCII packet logging mode or IDS mode with straight decoded ASCII packet logging selected, allows remote attackers to cause a denial of service (crash) by sending non-IP protocols that Snort does not know about, as demonstrated by an nmap protocol scan.
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2000-06/0122.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2000-06/0126.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2000-06/0122.html
+1
CVE-2000-0324
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
pcAnywhere 8.x and 9.0 allows remote attackers to cause a denial of service via a TCP SYN scan, e.g. by nmap.
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html
archives.neohapsis.com logo
http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html
+9
CVE-1999-0454
CRITICAL [10.0]
Last Modified: 11/20/2024
A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/2048
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/2048