Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
isc dhcp 4.2.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-2494
libdns in ISC DHCP 4.2.x prior to 4.2.5-P1 allows remote name servers to cause a denial of service (memory consumption) via vectors involving a regular expression, as demonstrated by a memory-exhaustion attack against a machine running a dhcpd process, a related issue to CVE-2013...
Isc Dhcp 4.2.2
Isc Dhcp 4.2.0
Isc Dhcp 4.2.4
Isc Dhcp 4.2.1
Isc Dhcp 4.2.3
Isc Dhcp 4.2.5
5.9
CVSSv3
CVE-2016-2774
ISC DHCP 4.1.x prior to 4.1-ESV-R13 and 4.2.x and 4.3.x prior to 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote malicious users to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
Isc Dhcp 4.1-esv
Isc Dhcp 4.1.0
Isc Dhcp 4.1.1
Isc Dhcp 4.1.2
Isc Dhcp 4.2.0
Isc Dhcp 4.2.1
Isc Dhcp 4.2.2
Isc Dhcp 4.2.3
Isc Dhcp 4.2.4
Isc Dhcp 4.2.5
Isc Dhcp 4.2.6
Isc Dhcp 4.2.7
Isc Dhcp 4.2.8
Isc Dhcp 4.3.0
Isc Dhcp 4.3.1
Isc Dhcp 4.3.2
Isc Dhcp 4.3.3
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.10
6.5
CVSSv3
CVE-2015-8605
ISC DHCP 4.x prior to 4.1-ESV-R12-P1, 4.2.x, and 4.3.x prior to 4.3.3-P1 allows remote malicious users to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
Sophos Unified Threat Management Up2date
Isc Dhcp 4.0.0
Isc Dhcp 4.0.1
Isc Dhcp 4.0.2
Isc Dhcp 4.0.3
Isc Dhcp 4.1-esv
Isc Dhcp 4.1.0
Isc Dhcp 4.1.1
Isc Dhcp 4.1.2
Isc Dhcp 4.2.0
Isc Dhcp 4.2.1
Isc Dhcp 4.2.2
Isc Dhcp 4.2.3
Isc Dhcp 4.2.4
Isc Dhcp 4.2.5
Isc Dhcp 4.2.6
Isc Dhcp 4.2.7
Isc Dhcp 4.2.8
Isc Dhcp 4.3.0
Isc Dhcp 4.3.1
Isc Dhcp 4.3.2
Isc Dhcp 4.3.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started