Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
authoritative vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-3122
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3424, CVE-2005-3425. Reason: this candidate was intended for one issue, but two different authoritative sources used it for two distinct issues. Notes: All CVE users should consult CVE-2005-3424 and CVE-2005-...
5
CVSSv2
CVE-2004-1754
The DNS proxy (DNSd) for multiple Symantec Gateway Security products allows remote malicious users to poison the DNS cache via a malicious DNS server query response that contains authoritative or additional records.
Symantec Enterprise Firewall 8.0
Symantec Enterprise Firewall 7.0.4
Symantec Gateway Security 5200 1.0
Symantec Gateway Security 5310 1.0
Symantec Gateway Security 5400 2.0.1
Symantec Gateway Security 5110 1.0
Symantec Gateway Security 5300 1.0
Symantec Gateway Security 5400 2.0
1 EDB exploit
4.3
CVSSv2
CVE-2003-0914
ISC BIND 8.3.x prior to 8.3.7, and 8.4.x prior to 8.4.3, allows remote malicious users to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.
Isc Bind 8.2.3
Isc Bind 8.3.2
Isc Bind 8.3.3
Nixu Namesurfer Suite 3.0.1
Isc Bind 8.2.4
Isc Bind 8.2.5
Isc Bind 8.3.4
Isc Bind 8.3.5
Isc Bind 8.3.0
Isc Bind 8.3.1
Isc Bind 8.4.1
Nixu Namesurfer Standard 3.0.1
Isc Bind 8.2.6
Isc Bind 8.2.7
Isc Bind 8.3.6
Isc Bind 8.4
Compaq Tru64 5.1
Compaq Tru64 5.1 Pk3 Bl17
Compaq Tru64 5.1a Pk3 Bl3
Compaq Tru64 5.1a Pk4 Bl21
Freebsd Freebsd 4.6
Freebsd Freebsd 4.6.2
5
CVSSv2
CVE-2003-0688
The DNS map code in Sendmail 8.12.8 and previous versions, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote malicious users to cause a denial of service (process crash) via an invalid DNS response that causes S...
Redhat Sendmail 8.12.8-4
Sendmail Sendmail 8.12.1
Sendmail Sendmail 8.12.8
Sgi Irix 6.5.19
Redhat Sendmail 8.12.5-7
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sgi Irix 6.5.20
Sgi Irix 6.5.21
Sendmail Sendmail 8.12.6
Sendmail Sendmail 8.12.7
Freebsd Freebsd 4.7
Freebsd Freebsd 4.8
Compaq Tru64 5.0a
Freebsd Freebsd 5.0
Openbsd Openbsd 3.2
Compaq Tru64 5.1
Freebsd Freebsd 4.6
10
CVSSv2
CVE-2002-1235
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and previous versions, (2) kadmind in KTH Kerberos 4 (eBones) prior to 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) prior to 0.5.1 when comp...
Kth Kth Kerberos 4
Kth Kth Kerberos 5
Mit Kerberos 5
Debian Debian Linux 3.0
7.5
CVSSv2
CVE-2002-0511
The default configuration of Name Service Cache Daemon (nscd) in Caldera OpenLinux 3.1 and 3.1.1 uses cached PTR records instead of consulting the authoritative DNS server for the A record, which could make it easier for remote malicious users to bypass applications that restrict...
Nscd Nscd 2.2.4
NA
CVE-2002-0192
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0193, CVE-2002-1564. Reason: This candidate was published with a description that identified a different vulnerability than what was identified in the original authoritative reference. Notes: Consult CVE-2002...
1 EDB exploit
10
CVSSv2
CVE-2002-0018
In Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which allows remote malicious users to gain Domain Administrator privileges on t...
Microsoft Windows 2000
Microsoft Windows Nt
5
CVSSv2
CVE-2000-0887
named in BIND 8.2 up to and including 8.2.2-P6 allows remote malicious users to cause a denial of service by making a compressed zone transfer (ZXFR) request and performing a name service query on an authoritative record that is not cached, aka the "zxfr bug."
Isc Bind 8.2.2
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9