Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dnrd dnrd 2.7 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-0037
The DNS implementation of DNRD prior to 2.10 allows remote malicious users to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
Dnrd Dnrd 1.4
Dnrd Dnrd 2.0
Dnrd Dnrd 2.1
Dnrd Dnrd 2.2
Dnrd Dnrd 1.0
Dnrd Dnrd 1.2
Dnrd Dnrd 2.4
Dnrd Dnrd 2.6
Dnrd Dnrd 2.7
Dnrd Dnrd 2.8
Dnrd Dnrd 2.9
Dnrd Dnrd 1.1
Dnrd Dnrd 1.3
Dnrd Dnrd 2.3
Dnrd Dnrd 2.5
NA
CVE-2005-2315
Buffer overflow in Domain Name Relay Daemon (DNRD) prior to 2.19.1 allows remote malicious users to execute arbitrary code via a large number of large DNS packets with the Z and QR flags cleared.
Dnrd Dnrd 1.0
Dnrd Dnrd 1.1
Dnrd Dnrd 1.2
Dnrd Dnrd 1.3
Dnrd Dnrd 2.2
Dnrd Dnrd 2.3
Dnrd Dnrd 2.4
Dnrd Dnrd 2.5
Dnrd Dnrd 2.0
Dnrd Dnrd 2.10
Dnrd Dnrd 2.6
Dnrd Dnrd 2.8
Dnrd Dnrd 1.4
Dnrd Dnrd 2.1
Dnrd Dnrd 2.7
Dnrd Dnrd 2.9
1 Github repository
NA
CVE-2002-0140
Domain Name Relay Daemon (dnrd) 2.10 and previous versions allows remote malicious DNS sites to cause a denial of service and possibly execute arbitrary code via a long or malformed DNS reply, which is not handled properly by parse_query, get_objectname, and possibly other functi...
Dnrd Dnrd 2.3
Dnrd Dnrd 2.4
Dnrd Dnrd 2.5
Dnrd Dnrd 2.6
Dnrd Dnrd 1.0
Dnrd Dnrd 1.1
Dnrd Dnrd 1.2
Dnrd Dnrd 1.3
Dnrd Dnrd 1.4
Dnrd Dnrd 2.1
Dnrd Dnrd 2.2
Dnrd Dnrd 2.7
Dnrd Dnrd 2.9
Dnrd Dnrd 2.0
Dnrd Dnrd 2.10
Dnrd Dnrd 2.8
1 EDB exploit
NA
CVE-2005-2316
Domain Name Relay Daemon (DNRD) prior to 2.19.1 allows remote malicious users to cause a denial of service (infinite recursion) via a DNS packet that uses message compression in the QNAME and two pointers that point to each other (circular buffer).
Dnrd Dnrd 2.0
Dnrd Dnrd 2.1
Dnrd Dnrd 2.10
Dnrd Dnrd 2.2
Dnrd Dnrd 2.3
Dnrd Dnrd 2.4
Dnrd Dnrd 2.5
Dnrd Dnrd 2.14
Dnrd Dnrd 2.14.1
Dnrd Dnrd 2.15
Dnrd Dnrd 2.16
Dnrd Dnrd 2.16.1
Dnrd Dnrd 2.12
Dnrd Dnrd 2.13
Dnrd Dnrd 2.17.2
Dnrd Dnrd 2.19
Dnrd Dnrd 2.6
Dnrd Dnrd 2.8
Dnrd Dnrd 2.11
Dnrd Dnrd 2.12.1
Dnrd Dnrd 2.17.1
Dnrd Dnrd 2.18
NA
CVE-2004-0789
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and previous versions as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x prior to 2.2.3 and 3.5.x prior to 3.5.2, allow remote malicious users to cause a ...
Delegate Delegate 7.8.1
Delegate Delegate 7.8.2
Delegate Delegate 8.9.1
Delegate Delegate 8.9.2
Dnrd Dnrd 1.3
Dnrd Dnrd 1.4
Dnrd Dnrd 2.0
Dnrd Dnrd 2.6
Dnrd Dnrd 2.7
Don Moore Mydns 0.9
Maradns Maradns 0.5.28
Posadis Posadis 0.50.6
Posadis Posadis 0.50.7
Qbik Wingate 3.0
Qbik Wingate 4.0.1
Delegate Delegate 7.7.1
Delegate Delegate 7.8.0
Delegate Delegate 8.5.0
Delegate Delegate 8.9
Dnrd Dnrd 1.1
Dnrd Dnrd 1.2
Dnrd Dnrd 2.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started