Loading...
Loading...
The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions.
June 4, 1992
April 16, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-1999-0168
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.