Page 2 of 8 results (0.009 seconds)

CVSS: 7.5EPSS: 5%CPEs: 16EXPL: 0

Multiple vulnerabilities in xinetd 2.3.0 and earlier, and additional variants until 2.3.3, may allow remote attackers to cause a denial of service or execute arbitrary code, primarily via buffer overflows or improper NULL termination. • http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-033-01 http://marc.info/?l=bugtraq&m=99913751525583&w=2 http://rhn.redhat.com/errata/RHSA-2001-109.html http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-076.php3 http://www.securityfocus.com/bid/3257 •

CVSS: 3.6EPSS: 0%CPEs: 16EXPL: 0

xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000404 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-024-01 http://www.debian.org/security/2001/dsa-063 http://www.iss.net/security_center/static/6657.php http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-055.php3 http://www.linuxsecurity.com/advisories/other_advisory-1469.html http://www.redhat.com/support/errata/RHSA-2001-075.html http://www.securityfocus.com/bid/2826 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 1

xinetd 2.1.8.x does not properly restrict connections if hostnames are used for access control and the connecting host does not have a reverse DNS entry. • http://www.debian.org/security/2000/20000619 http://www.securityfocus.com/bid/1381 http://www.synack.net/xinetd https://exchange.xforce.ibmcloud.com/vulnerabilities/4986 •