Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
name server daemon vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2012-2979
FreeBSD NSD prior to 3.2.13 allows remote malicious users to crash a NSD child server process (SIGSEGV) and cause a denial of service in the NSD server.
Freebsd Name Server Daemon
9.8
CVSSv3
CVE-2019-13207
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
Nlnetlabs Name Server Daemon 4.2.0
5.5
CVSSv3
CVE-2020-28935
NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an exis...
Nlnetlabs Unbound
Nlnetlabs Name Server Daemon
Debian Debian Linux 9.0
NA
CVE-2014-5353
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) prior to 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query wit...
Mit Kerberos 5
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.6
Redhat Enterprise Linux Eus 7.3
Redhat Enterprise Linux Eus 7.4
Redhat Enterprise Linux Eus 7.5
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux Eus 7.7
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Aus 6.6
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 6.6
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Workstation 6.0
Fedoraproject Fedora 22
Debian Debian Linux 7.0
NA
CVE-2009-5073
IBM Tivoli Directory Server (TDS) 6.0 prior to 6.0.0.59 (aka 6.0.0.8-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (infinite loop and daemon hang) by adding a nested group that contains the Distinguished Name (DN) of its parent entry.
Ibm Tivoli Directory Server 6.0.0.7
Ibm Tivoli Directory Server 6.0.0.14
Ibm Tivoli Directory Server 6.0.0.33
Ibm Tivoli Directory Server 6.0.0.52
Ibm Tivoli Directory Server 6.0.0.8
Ibm Tivoli Directory Server 6.0.0.55
Ibm Tivoli Directory Server 6.0.0.54
Ibm Tivoli Directory Server 6.0.0.57
Ibm Tivoli Directory Server 6.0.0.56
Ibm Tivoli Directory Server 6.0.0.19
Ibm Tivoli Directory Server 6.0.0.45
Ibm Tivoli Directory Server 6.0.0.41
Ibm Tivoli Directory Server 6.0.0.53
Ibm Tivoli Directory Server 6.0
Ibm Tivoli Directory Server 6.0.0.58
Ibm Tivoli Directory Server 6.0.0.1
Ibm Tivoli Directory Server 6.0.0.0
7.5
CVSSv3
CVE-2020-29596
MiniWeb HTTP server 0.8.19 allows remote malicious users to cause a denial of service (daemon crash) via a long name for the first parameter in a POST request.
Miniweb Http Server Project Miniweb Http Server 0.8.19
1 Github repository
NA
CVE-2012-0021
The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 up to and including 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote malicious users to cause a denial of service (daem...
Apache Http Server 2.2.17
Apache Http Server 2.2.21
Apache Http Server 2.2.19
Apache Http Server 2.2.18
Apache Http Server 2.2.20
NA
CVE-2008-0406
HTTP File Server (HFS) prior to 2.2c, when account names are used as log filenames, allows remote malicious users to cause a denial of service (daemon crash) via a long account name.
Hfs Http File Server
1 EDB exploit
NA
CVE-2001-1338
Beck IPC GmbH IPC@CHIP TelnetD server generates different responses when given valid and invalid login names, which allows remote malicious users to determine accounts on the system.
Beck Ipc Gmbh Ipc At Chip Telnetd Server
NA
CVE-2005-1256
Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
Ipswitch Imail 8.13
Ipswitch Ipswitch Collaboration Suite
Ipswitch Imail Server
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
XXE
CVE-2024-34490
SQL injection
CVE-2024-34488
CVE-2024-4507
CVE-2023-7028
CVE-2024-23187
TCP
CVE-2024-4439
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »