Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
name server daemon vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-2444
Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d up to and including 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user.
Samba Samba 3.0.25
Samba Samba 3.0.24
Samba Samba 3.0.23d
Debian Debian Linux 5.0
Debian Debian Linux 4.0
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
NA
CVE-2011-1910
Off-by-one error in named in ISC BIND 9.x prior to 9.7.3-P1, 9.8.x prior to 9.8.0-P2, 9.4-ESV prior to 9.4-ESV-R4-P1, and 9.6-ESV prior to 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing l...
Isc Bind 9.6.2
Isc Bind 9.4.2
Isc Bind 9.6.1
Isc Bind 9.2.0
Isc Bind 9.1.1
Isc Bind 9.3.1
Isc Bind 9.5.0
Isc Bind 9.4.3
Isc Bind 9.5.2
Isc Bind 9.2.3
Isc Bind 9.1.3
Isc Bind 9.5.1
Isc Bind 9.7.0
Isc Bind 9.4
Isc Bind 9.6
Isc Bind 9.7.1
Isc Bind 9.7.2
Isc Bind 9.4.0
Isc Bind 9.3.5
Isc Bind 9.3.2
Isc Bind 9.2.8
Isc Bind 9.2
NA
CVE-2012-1667
ISC BIND 9.x prior to 9.7.6-P1, 9.8.x prior to 9.8.3-P1, 9.9.x prior to 9.9.1-P1, and 9.4-ESV and 9.6-ESV prior to 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash ...
Isc Bind 9.6.2
Isc Bind 9.4.2
Isc Bind 9.6.1
Isc Bind 9.2.0
Isc Bind 9.1.1
Isc Bind 9.3.1
Isc Bind 9.5.0
Isc Bind 9.4.3
Isc Bind 9.5.2
Isc Bind 9.2.3
Isc Bind 9.7.5
Isc Bind 9.1.3
Isc Bind 9.5.1
Isc Bind 9.7.0
Isc Bind 9.4
Isc Bind 9.9.0
Isc Bind 9.6
Isc Bind 9.7.1
Isc Bind 9.7.2
Isc Bind 9.4.0
Isc Bind 9.3.5
Isc Bind 9.3.2
1 Nmap script
7.8
CVSSv3
CVE-2018-4180
In macOS High Sierra prior to 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.
Apple Mac Os X
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 18.04
5.5
CVSSv3
CVE-2018-4181
In macOS High Sierra prior to 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.
Apple Mac Os X
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 18.04
Debian Debian Linux 8.0
Debian Debian Linux 9.0
8.8
CVSSv3
CVE-2018-6553
The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions before 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, before 2.2.4-7ubuntu3.1 in Ubuntu 17.10, before...
Debian Debian Linux 8.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Debian Debian Linux 9.0
Canonical Ubuntu Linux 17.10
Cups Cups -
Canonical Ubuntu Linux 18.04
NA
CVE-2009-4030
MySQL 5.1.x prior to 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tabl...
Mysql Mysql 5.1.23
Mysql Mysql 5.1.32
Mysql Mysql 5.1.5
Oracle Mysql 5.1
Oracle Mysql 5.1.1
Oracle Mysql 5.1.2
Oracle Mysql 5.1.3
Oracle Mysql 5.1.4
Oracle Mysql 5.1.6
Oracle Mysql 5.1.7
Oracle Mysql 5.1.8
Oracle Mysql 5.1.9
Oracle Mysql 5.1.10
Oracle Mysql 5.1.11
Oracle Mysql 5.1.12
Oracle Mysql 5.1.13
Oracle Mysql 5.1.14
Oracle Mysql 5.1.15
Oracle Mysql 5.1.16
Oracle Mysql 5.1.17
Oracle Mysql 5.1.18
Oracle Mysql 5.1.19
5.3
CVSSv3
CVE-2022-2795
By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
Isc Bind 9.11.7
Isc Bind 9.11.3
Isc Bind 9.11.6
Isc Bind 9.10.5
Isc Bind 9.11.5
Isc Bind 9.9.3
Isc Bind 9.10.7
Isc Bind 9.11.12
Isc Bind 9.11.8
Isc Bind 9.9.12
Isc Bind 9.9.13
Isc Bind 9.11.21
Isc Bind 9.16.8
Isc Bind 9.16.11
Isc Bind 9.11.27
Isc Bind 9.16.13
Isc Bind 9.11.29
Isc Bind 9.16.21
Isc Bind 9.11.35
Isc Bind 9.11.14-s1
Isc Bind 9.11.19-s1
Isc Bind
3 Github repositories
7.5
CVSSv3
CVE-2022-38177
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Isc Bind 9.11.7
Isc Bind 9.11.3
Isc Bind 9.11.6
Isc Bind 9.10.5
Isc Bind 9.11.5
Isc Bind 9.9.3
Isc Bind 9.10.7
Isc Bind 9.11.12
Isc Bind 9.11.8
Isc Bind 9.9.12
Isc Bind 9.9.13
Isc Bind 9.11.21
Isc Bind 9.16.8
Isc Bind 9.16.11
Isc Bind 9.11.27
Isc Bind 9.16.13
Isc Bind 9.11.29
Isc Bind 9.16.21
Isc Bind 9.11.35
Isc Bind 9.11.14-s1
Isc Bind 9.11.19-s1
Isc Bind 9.11.37
7.5
CVSSv3
CVE-2022-38178
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Isc Bind
Isc Bind 9.11.7
Isc Bind 9.11.3
Isc Bind 9.11.6
Isc Bind 9.11.5
Isc Bind 9.11.12
Isc Bind 9.11.8
Isc Bind 9.11.21
Isc Bind 9.16.8
Isc Bind 9.16.11
Isc Bind 9.11.27
Isc Bind 9.16.13
Isc Bind 9.11.29
Isc Bind 9.16.21
Isc Bind 9.11.35
Isc Bind 9.11.14-s1
Isc Bind 9.11.19-s1
Isc Bind 9.11.37
Isc Bind 9.16.32
Debian Debian Linux 11.0
Fedoraproject Fedora 35
Fedoraproject Fedora 36
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
NEXT »