Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
isc bind 4.9 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-1999-1499
named in ISC BIND 4.9 and 8.1 allows local users to destroy files via a symlink attack on (1) named_dump.db when root kills the process with a SIGINT, or (2) named.stats when SIGIOT is used.
Isc Bind 4.9
Isc Bind 8.1
1 EDB exploit
5
CVSSv2
CVE-2002-2211
BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote malicious users to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increa...
Isc Bind 4.9
Isc Bind 4.9.10
Isc Bind 4.9.7
Isc Bind 4.9.8
Isc Bind 8.2.2
Isc Bind 8.2.7
Isc Bind 8.3.0
Isc Bind 4.9.5
Isc Bind 4.9.6
Isc Bind 8.2.5
Isc Bind 8.2.6
Isc Bind 4.9.2
Isc Bind 4.9.3
Isc Bind 4.9.9
Isc Bind 8.2
Isc Bind 8.2.1
Isc Bind 8.3.1
Isc Bind 8.3.2
Isc Bind 4.9.4
Isc Bind 8.2.3
Isc Bind 8.2.4
Isc Bind 8.3.3
5
CVSSv2
CVE-2002-2213
The DNS resolver in unspecified versions of Infoblox DNS One, when resolving recursive DNS queries for arbitrary hosts, allows remote malicious users to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) co...
Isc Bind 4.9.3
Isc Bind 4.9.5
Infoblox Dns One
Isc Bind 4.9
Isc Bind 4.9.10
Isc Bind 4.9.2
Isc Bind 8.2.2
Isc Bind 8.2.1
Isc Bind 8.2.3
Isc Bind 8.2.5
Isc Bind 8.3.2
Isc Bind 8.3.4
Isc Bind 4.9.6
Isc Bind 4.9.7
Isc Bind 4.9.8
Isc Bind 4.9.9
Isc Bind 8.2.6
Isc Bind 8.2.7
Isc Bind 8.3.0
Isc Bind 8.3.1
Isc Bind 4.9.4
Isc Bind 8.2
5
CVSSv2
CVE-2002-2212
The DNS resolver in unspecified versions of Fujitsu UXP/V, when resolving recursive DNS queries for arbitrary hosts, allows remote malicious users to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combi...
Isc Bind 4.9.4
Isc Bind 4.9.5
Isc Bind 4.9.7
Isc Bind 8.2.2
Isc Bind 8.2.4
Isc Bind 8.2.6
Isc Bind 8.3.3
Isc Bind 4.9
Isc Bind 4.9.10
Isc Bind 4.9.2
Isc Bind 4.9.3
Isc Bind 4.9.8
Isc Bind 4.9.9
Isc Bind 8.2
Isc Bind 8.2.1
Isc Bind 8.2.7
Isc Bind 8.3.0
Isc Bind 8.3.1
Isc Bind 8.3.2
Isc Bind 4.9.6
Isc Bind 8.2.3
Isc Bind 8.2.5
5
CVSSv2
CVE-2001-0012
BIND 4 and BIND 8 allow remote malicious users to access sensitive information such as environment variables.
Isc Bind 4.9.3
Isc Bind 8.2
Isc Bind 8.2.2
Isc Bind 4.9.5
Isc Bind 4.9.6
Isc Bind 4.9.7
Isc Bind 8.2.1
10
CVSSv2
CVE-2001-0011
Buffer overflow in nslookupComplain function in BIND 4 allows remote malicious users to gain root privileges.
Isc Bind 4.9.5
Isc Bind 4.9.7
Isc Bind 4.9.3
Isc Bind 4.9.6
10
CVSSv2
CVE-2001-0013
Format string vulnerability in nslookupComplain function in BIND 4 allows remote malicious users to gain root privileges.
Isc Bind 4.9.3
Isc Bind 4.9.5
Isc Bind 4.9.6
Isc Bind 4.9.7
4.3
CVSSv2
CVE-2003-0914
ISC BIND 8.3.x prior to 8.3.7, and 8.4.x prior to 8.4.3, allows remote malicious users to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.
Isc Bind 8.2.3
Isc Bind 8.3.2
Isc Bind 8.3.3
Nixu Namesurfer Suite 3.0.1
Isc Bind 8.2.4
Isc Bind 8.2.5
Isc Bind 8.3.4
Isc Bind 8.3.5
Isc Bind 8.3.0
Isc Bind 8.3.1
Isc Bind 8.4.1
Nixu Namesurfer Standard 3.0.1
Isc Bind 8.2.6
Isc Bind 8.2.7
Isc Bind 8.3.6
Isc Bind 8.4
Compaq Tru64 5.1
Compaq Tru64 5.1 Pk3 Bl17
Compaq Tru64 5.1a Pk3 Bl3
Compaq Tru64 5.1a Pk4 Bl21
Freebsd Freebsd 4.6
Freebsd Freebsd 4.6.2
7.5
CVSSv2
CVE-1999-0833
Buffer overflow in BIND 8.2 via NXT records.
Isc Bind 8.2
Isc Bind 8.2.1
Sun Sunos 5.7
Sun Solaris 7.0
10
CVSSv2
CVE-1999-0011
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
Data General Dg Ux Y2k Patchr4.20mu03
Isc Bind 4.9
Isc Bind 8
Data General Dg Ux Y2k Patchr4.11mu05
Data General Dg Ux Y2k Patchr4.20mu01
Data General Dg Ux Y2k Patchr4.12mu03
Data General Dg Ux Y2k Patchr4.20mu02
Sco Unixware 2.1
Sco Unixware 7.0
Sun Sunos 5.3
Sun Sunos 5.4
Nec Asl Ux 4800 13
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Redhat Linux 4.2
Ibm Aix 4.2
Nec Asl Ux 4800 11
Redhat Linux 5.0
Sco Openserver 5.0
Sun Sunos 5.5.1
Ibm Aix 4.1
Ibm Aix 4.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »