Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
isc dhcp 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-0413
The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x prior to 4.1.2-P1, 4.0-ESV and 4.1-ESV prior to 4.1-ESV-R1, and 4.2.x prior to 4.2.1b1 allows remote malicious users to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and a...
Isc Dhcp 4.0.2
Isc Dhcp 4.0.1
Isc Dhcp 4.0.3
Isc Dhcp 4.0.0
Isc Dhcp 4.0
Isc Dhcp 4.1.1
Isc Dhcp 4.1.0
Isc Dhcp 4.1.2
Isc Dhcp 4.0-esv
Isc Dhcp 4.1-esv
Isc Dhcp 4.2.0
NA
CVE-2010-3611
ISC DHCP server 4.0 prior to 4.0.2, 4.1 prior to 4.1.2, and 4.2 prior to 4.2.0-P1 allows remote malicious users to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-ad...
Isc Dhcp 4.1.0
Isc Dhcp 4.1.1
Isc Dhcp 4.2.0
Isc Dhcp 4.0.1
Isc Dhcp 4.0.0
Isc Dhcp 4.0
NA
CVE-2009-0692
Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 prior to 4.1.0p1, 4.0 prior to 4.0.1p1, 3.1 prior to 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
Isc Dhcp 4.1.0
Isc Dhcp 2.0
Isc Dhcp 3.0
Isc Dhcp 3.1
Isc Dhcp 4.0
1 EDB exploit
NA
CVE-2011-2748
The server in ISC DHCP 3.x and 4.x prior to 4.2.2, 3.1-ESV prior to 3.1-ESV-R3, and 4.1-ESV prior to 4.1-ESV-R3 allows remote malicious users to cause a denial of service (daemon exit) via a crafted DHCP packet.
Isc Dhcp 4.0.2
Isc Dhcp 4.1-esv
Isc Dhcp 3.0.4
Isc Dhcp 3.1.0
Isc Dhcp 4.1.0
Isc Dhcp 3.0.6
Isc Dhcp 3.1.2
Isc Dhcp 4.1.1
Isc Dhcp 4.2.0
Isc Dhcp 3.0.1
Isc Dhcp 3.0
Isc Dhcp 3.0.2
Isc Dhcp 3.0.3
Isc Dhcp 4.0.1
Isc Dhcp 4.2.1
Isc Dhcp 3.1-esv
Isc Dhcp 3.1.3
Isc Dhcp 4.0.3
Isc Dhcp 3.1.1
Isc Dhcp 4.0.0
Isc Dhcp 3.1
Isc Dhcp 4.0
NA
CVE-2011-2749
The server in ISC DHCP 3.x and 4.x prior to 4.2.2, 3.1-ESV prior to 3.1-ESV-R3, and 4.1-ESV prior to 4.1-ESV-R3 allows remote malicious users to cause a denial of service (daemon exit) via a crafted BOOTP packet.
Isc Dhcp 4.0.2
Isc Dhcp 4.1-esv
Isc Dhcp 3.0.4
Isc Dhcp 3.1.0
Isc Dhcp 4.1.0
Isc Dhcp 3.0.6
Isc Dhcp 3.1.2
Isc Dhcp 4.1.1
Isc Dhcp 4.2.0
Isc Dhcp 3.0.1
Isc Dhcp 3.0
Isc Dhcp 3.0.2
Isc Dhcp 3.0.3
Isc Dhcp 4.0.1
Isc Dhcp 4.2.1
Isc Dhcp 3.1-esv
Isc Dhcp 3.1.3
Isc Dhcp 4.0.3
Isc Dhcp 3.1.1
Isc Dhcp 4.0.0
Isc Dhcp 3.1
Isc Dhcp 4.0
NA
CVE-2011-4539
dhcpd in ISC DHCP 4.x prior to 4.2.3-P1 and 4.1-ESV prior to 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote malicious users to cause a denial of service (daemon crash) via a crafted request packet.
Isc Dhcp 4.0.2
Isc Dhcp 4.2.2
Isc Dhcp 4.1.1
Isc Dhcp 4.2.0
Isc Dhcp 4.0.1
Isc Dhcp 4.2.1
Isc Dhcp 4.0.3
Isc Dhcp 4.0.0
Isc Dhcp 4.0
Isc Dhcp 4.1.2
Isc Dhcp 4.2.3
Isc Dhcp 4.1-esv
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Debian Debian Linux 7.0
Debian Debian Linux 6.0
NA
CVE-2010-2156
ISC DHCP 4.1 prior to 4.1.1-P1 and 4.0 prior to 4.0.2-P1 allows remote malicious users to cause a denial of service (server exit) via a zero-length client ID.
Isc Dhcp 4.1.0
Isc Dhcp 4.1.1
Isc Dhcp 4.0.2
Isc Dhcp 4.0.1
Isc Dhcp 4.0.0
1 EDB exploit
7.4
CVSSv3
CVE-2021-25217
In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the ...
Isc Dhcp 4.1-esv
Isc Dhcp
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 9.0
Siemens Ruggedcom Rox Rx1400 Firmware
Siemens Ruggedcom Rox Rx1500 Firmware
Siemens Ruggedcom Rox Rx1501 Firmware
Siemens Ruggedcom Rox Rx1510 Firmware
Siemens Ruggedcom Rox Rx1511 Firmware
Siemens Ruggedcom Rox Rx1512 Firmware
Siemens Ruggedcom Rox Rx1524 Firmware
Siemens Ruggedcom Rox Rx1536 Firmware
Siemens Ruggedcom Rox Rx5000 Firmware
Siemens Ruggedcom Rox Mx5000 Firmware
Netapp Ontap Select Deploy Administration Utility -
Netapp Solidfire & Hci Management Node -
Siemens Sinec Ins 1.0
Siemens Sinec Ins
NA
CVE-2007-5365
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 up to and including 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote malicious users to execute arbitrary code or cause a denial of service (daemon crash) via...
Sun Opensolaris Snv 36
Sun Opensolaris Snv 30
Sun Opensolaris Snv 70
Sun Opensolaris Snv 33
Sun Opensolaris Snv 101
Sun Opensolaris Snv 90
Sun Opensolaris Snv 93
Sun Opensolaris Snv 85
Sun Opensolaris Snv 57
Sun Opensolaris Snv 87
Openbsd Openbsd 4.1
Sun Opensolaris Snv 26
Sun Opensolaris Snv 50
Redhat Enterprise Linux 2.1
Sun Opensolaris Snv 73
Sun Opensolaris Snv 72
Sun Opensolaris Snv 67
Ubuntu Ubuntu Linux 6.06
Sun Opensolaris Snv 91
Sun Opensolaris Snv 92
Sun Opensolaris Snv 01
Sun Opensolaris Snv 77
1 EDB exploit
NA
CVE-2007-0062
Integer overflow in the ISC dhcpd 3.0.x prior to 3.0.7 and 3.1.x prior to 3.1.1; and the DHCP server in EMC VMware Workstation prior to 5.5.5 Build 56455 and 6.x prior to 6.0.1 Build 55017, Player prior to 1.0.5 Build 56455 and Player 2 prior to 2.0.1 Build 55017, ACE prior to 1....
Vmware Workstation 4.0
Vmware Ace 2.0
Vmware Workstation 5.5.4 Build 44386
Vmware Workstation 6.0
Vmware Workstation 5.5.3 Build 34685
Vmware Workstation 5.5.0 Build 13124
Vmware Workstation 5.5.1 Build 19175
Vmware Workstation 4.0.1
Vmware Workstation 5.5.3 Build 42958
Vmware Workstation 3.4
Vmware Player 1.0.4
Vmware Workstation 4.0.2
Vmware Ace 1.0.3
Vmware Workstation 5.5.1
Vmware Server 1.0.3
Vmware Player 2.0
Vmware Vmware Workstation 6.0.1
Vmware Workstation 5.5.4
Vmware Workstation 4.5.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30078
CVE-2024-37896
code injection
CVE-2024-3080
CVE-2024-5172
cross-site request forgery
CVE-2024-6111
firmware
CVE-2024-38504
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started