Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
isc vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0011
Buffer overflow in nslookupComplain function in BIND 4 allows remote malicious users to gain root privileges.
Isc Bind 4.9.5
Isc Bind 4.9.7
Isc Bind 4.9.3
Isc Bind 4.9.6
7.5
CVSSv3
CVE-2022-3488
Processing of repeated responses to the same query, where both responses contain ECS pseudo-options, but where the first is broken in some way, can cause BIND to exit with an assertion failure. 'Broken' in this context is anything that would cause the resolver to reject...
Isc Bind 9.16.8
Isc Bind 9.11.37
Isc Bind 9.16.36
Isc Bind 9.11.4
5.3
CVSSv3
CVE-2019-6465
Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview ...
Isc Bind
Isc Bind 9.9.3
Isc Bind 9.10.8
Isc Bind 9.11.5
Isc Bind 9.12.3
Redhat Enterprise Linux 8.0
NA
CVE-2011-0997
dhclient in ISC DHCP 3.0.x up to and including 4.2.x prior to 4.2.1-P1, 3.1-ESV prior to 3.1-ESV-R1, and 4.1-ESV prior to 4.1-ESV-R2 allows remote malicious users to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by...
Isc Dhcp 3.0
Isc Dhcp 3.0.1
Isc Dhcp 3.0.2
Isc Dhcp 3.0.3
Isc Dhcp 3.0.4
Isc Dhcp 3.0.5
Isc Dhcp 3.0.6
Isc Dhcp 3.1-esv
Isc Dhcp 3.1.0
Isc Dhcp 3.1.1
Isc Dhcp 3.1.2
Isc Dhcp 3.1.3
Isc Dhcp 4.1-esv
Isc Dhcp 4.2.0
Isc Dhcp 4.2.1
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
6.5
CVSSv3
CVE-2021-25214
In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulne...
Isc Bind 9.11.7
Isc Bind 9.11.3
Isc Bind 9.11.6
Isc Bind 9.10.5
Isc Bind 9.11.5
Isc Bind 9.9.3
Isc Bind 9.10.7
Isc Bind 9.11.12
Isc Bind 9.11.8
Isc Bind 9.9.12
Isc Bind 9.9.13
Isc Bind 9.11.21
Isc Bind 9.16.8
Isc Bind 9.16.11
Isc Bind 9.11.27
Isc Bind 9.16.13
Isc Bind 9.11.29
Isc Bind
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 33
Fedoraproject Fedora 34
1 Article
7.5
CVSSv3
CVE-2021-25215
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of name...
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Isc Bind 9.11.7
Isc Bind 9.11.3
Isc Bind 9.11.6
Isc Bind 9.10.5
Isc Bind 9.11.5
Isc Bind 9.9.3
Isc Bind 9.10.7
Isc Bind 9.11.12
Isc Bind 9.11.8
Isc Bind 9.9.12
Isc Bind 9.9.13
Isc Bind 9.11.21
Isc Bind 9.16.8
Isc Bind 9.16.11
Isc Bind 9.11.27
Isc Bind 9.16.13
Isc Bind 9.11.29
Isc Bind
Fedoraproject Fedora 33
Fedoraproject Fedora 34
1 Article
7.8
CVSSv3
CVE-2017-3141
The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.1...
Isc Bind
Isc Bind 9.3.2
Isc Bind 9.2.6
1 EDB exploit
1 Github repository
7.5
CVSSv3
CVE-2019-6477
With pipelining enabled each incoming query on a TCP connection requires a similar resource allocation to a query received via UDP or via TCP without pipelining enabled. A client using a TCP-pipelined connection to a server could consume more resources than the server has been pr...
Isc Bind 9.12.4
Isc Bind
Isc Bind 9.11.6
Isc Bind 9.11.5
Isc Bind 9.11.12
Fedoraproject Fedora 30
Fedoraproject Fedora 31
NA
CVE-2012-5688
ISC BIND 9.8.x prior to 9.8.4-P1 and 9.9.x prior to 9.9.2-P1, when DNS64 is enabled, allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via a crafted query.
Isc Bind 9.8.0
Isc Bind 9.8.1
Isc Bind 9.8.2
Isc Bind 9.8.3
Isc Bind 9.9.0
Isc Bind 9.9.1
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 12.04
2 Github repositories
5.3
CVSSv3
CVE-2021-25219
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative s...
Isc Bind 9.11.7
Isc Bind 9.11.3
Isc Bind 9.11.6
Isc Bind 9.10.5
Isc Bind 9.11.5
Isc Bind 9.9.3
Isc Bind 9.10.7
Isc Bind 9.11.12
Isc Bind 9.11.8
Isc Bind 9.9.12
Isc Bind 9.9.13
Isc Bind 9.11.21
Isc Bind 9.16.8
Isc Bind 9.16.11
Isc Bind 9.11.27
Isc Bind 9.16.13
Isc Bind 9.11.29
Isc Bind 9.16.21
Isc Bind
Isc Bind 9.11.35
Debian Debian Linux 9.0
Debian Debian Linux 10.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »