Page 20 of 99 results (0.014 seconds)

CVSS: 10.0EPSS: 9%CPEs: 76EXPL: 2

Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 https://www.exploit-db.com/exploits/19112 ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 http://www.securityfocus.com/bid/134 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages. • ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •

CVSS: 5.0EPSS: 0%CPEs: 23EXPL: 0

DNS cache poisoning via BIND, by predictable query IDs. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024 •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

When compiled with the -DALLOW_UPDATES option, bind allows dynamic updates to the DNS server, allowing for malicious modification of DNS records. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0184 •