Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
name server daemon vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2012-2979
FreeBSD NSD prior to 3.2.13 allows remote malicious users to crash a NSD child server process (SIGSEGV) and cause a denial of service in the NSD server.
Freebsd Name Server Daemon
668
VMScore
CVE-2019-13207
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
Nlnetlabs Name Server Daemon 4.2.0
187
VMScore
CVE-2020-28935
NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an exis...
Nlnetlabs Unbound
Nlnetlabs Name Server Daemon
Debian Debian Linux 9.0
312
VMScore
CVE-2014-5353
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) prior to 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query wit...
Mit Kerberos 5
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.6
Redhat Enterprise Linux Eus 7.3
Redhat Enterprise Linux Eus 7.4
Redhat Enterprise Linux Eus 7.5
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux Eus 7.7
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Aus 6.6
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 6.6
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Workstation 6.0
Fedoraproject Fedora 22
Debian Debian Linux 7.0
356
VMScore
CVE-2009-5073
IBM Tivoli Directory Server (TDS) 6.0 prior to 6.0.0.59 (aka 6.0.0.8-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (infinite loop and daemon hang) by adding a nested group that contains the Distinguished Name (DN) of its parent entry.
Ibm Tivoli Directory Server 6.0.0.7
Ibm Tivoli Directory Server 6.0.0.14
Ibm Tivoli Directory Server 6.0.0.33
Ibm Tivoli Directory Server 6.0.0.52
Ibm Tivoli Directory Server 6.0.0.8
Ibm Tivoli Directory Server 6.0.0.55
Ibm Tivoli Directory Server 6.0.0.54
Ibm Tivoli Directory Server 6.0.0.57
Ibm Tivoli Directory Server 6.0.0.56
Ibm Tivoli Directory Server 6.0.0.19
Ibm Tivoli Directory Server 6.0.0.45
Ibm Tivoli Directory Server 6.0.0.41
Ibm Tivoli Directory Server 6.0.0.53
Ibm Tivoli Directory Server 6.0
Ibm Tivoli Directory Server 6.0.0.58
Ibm Tivoli Directory Server 6.0.0.1
Ibm Tivoli Directory Server 6.0.0.0
445
VMScore
CVE-2020-29596
MiniWeb HTTP server 0.8.19 allows remote malicious users to cause a denial of service (daemon crash) via a long name for the first parameter in a POST request.
Miniweb Http Server Project Miniweb Http Server 0.8.19
1 Github repository
231
VMScore
CVE-2012-0021
The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 up to and including 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote malicious users to cause a denial of service (daem...
Apache Http Server 2.2.17
Apache Http Server 2.2.21
Apache Http Server 2.2.19
Apache Http Server 2.2.18
Apache Http Server 2.2.20
505
VMScore
CVE-2008-0406
HTTP File Server (HFS) prior to 2.2c, when account names are used as log filenames, allows remote malicious users to cause a denial of service (daemon crash) via a long account name.
Hfs Http File Server
1 EDB exploit
445
VMScore
CVE-2001-1338
Beck IPC GmbH IPC@CHIP TelnetD server generates different responses when given valid and invalid login names, which allows remote malicious users to determine accounts on the system.
Beck Ipc Gmbh Ipc At Chip Telnetd Server
890
VMScore
CVE-2005-1256
Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
Ipswitch Imail 8.13
Ipswitch Ipswitch Collaboration Suite
Ipswitch Imail Server
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »