|Max CVSS||7.6||Min CVSS||4.3||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
|22-04-2019 - 17:48||10-10-2013 - 00:55|
builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
|29-08-2017 - 01:31||04-06-2012 - 20:55|