Page 10 of 93 results (0.007 seconds)

CVSS: 7.5EPSS: 27%CPEs: 6EXPL: 0

18 Jun 2002 — ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype. • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.24.1/CSSA-2002-SCO.24.1.txt •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

21 Jul 2001 — dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates. • http://www.osvdb.org/5609 • CWE-276: Incorrect Default Permissions •

CVSS: 9.1EPSS: 1%CPEs: 1EXPL: 0

01 Jul 1997 — When compiled with the -DALLOW_UPDATES option, bind allows dynamic updates to the DNS server, allowing for malicious modification of DNS records. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0184 •