// For flags

CVE-1999-0010

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 1998-04-08 CVE Published
  • 1999-06-07 CVE Reserved
  • 2024-08-01 CVE Updated
  • 2025-05-24 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Data General
Search vendor "Data General"
Dg Ux
Search vendor "Data General" for product "Dg Ux"
y2k_patchr4.11mu05
Search vendor "Data General" for product "Dg Ux" and version "y2k_patchr4.11mu05"
-
Affected
Data General
Search vendor "Data General"
Dg Ux
Search vendor "Data General" for product "Dg Ux"
y2k_patchr4.12mu03
Search vendor "Data General" for product "Dg Ux" and version "y2k_patchr4.12mu03"
-
Affected
Data General
Search vendor "Data General"
Dg Ux
Search vendor "Data General" for product "Dg Ux"
y2k_patchr4.20mu01
Search vendor "Data General" for product "Dg Ux" and version "y2k_patchr4.20mu01"
-
Affected
Data General
Search vendor "Data General"
Dg Ux
Search vendor "Data General" for product "Dg Ux"
y2k_patchr4.20mu02
Search vendor "Data General" for product "Dg Ux" and version "y2k_patchr4.20mu02"
-
Affected
Data General
Search vendor "Data General"
Dg Ux
Search vendor "Data General" for product "Dg Ux"
y2k_patchr4.20mu03
Search vendor "Data General" for product "Dg Ux" and version "y2k_patchr4.20mu03"
-
Affected
Isc
Search vendor "Isc"
Bind
Search vendor "Isc" for product "Bind"
4.9
Search vendor "Isc" for product "Bind" and version "4.9"
-
Affected
Isc
Search vendor "Isc"
Bind
Search vendor "Isc" for product "Bind"
8
Search vendor "Isc" for product "Bind" and version "8"
-
Affected
Ibm
Search vendor "Ibm"
Aix
Search vendor "Ibm" for product "Aix"
4.1
Search vendor "Ibm" for product "Aix" and version "4.1"
-
Affected
Ibm
Search vendor "Ibm"
Aix
Search vendor "Ibm" for product "Aix"
4.2
Search vendor "Ibm" for product "Aix" and version "4.2"
-
Affected
Ibm
Search vendor "Ibm"
Aix
Search vendor "Ibm" for product "Aix"
4.3
Search vendor "Ibm" for product "Aix" and version "4.3"
-
Affected
Nec
Search vendor "Nec"
Asl Ux 4800
Search vendor "Nec" for product "Asl Ux 4800"
11
Search vendor "Nec" for product "Asl Ux 4800" and version "11"
-
Affected
Nec
Search vendor "Nec"
Asl Ux 4800
Search vendor "Nec" for product "Asl Ux 4800"
13
Search vendor "Nec" for product "Asl Ux 4800" and version "13"
-
Affected
Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
1.3
Search vendor "Netbsd" for product "Netbsd" and version "1.3"
-
Affected
Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
1.3.1
Search vendor "Netbsd" for product "Netbsd" and version "1.3.1"
-
Affected
Redhat
Search vendor "Redhat"
Linux
Search vendor "Redhat" for product "Linux"
4.2
Search vendor "Redhat" for product "Linux" and version "4.2"
-
Affected
Redhat
Search vendor "Redhat"
Linux
Search vendor "Redhat" for product "Linux"
5.0
Search vendor "Redhat" for product "Linux" and version "5.0"
-
Affected
Sco
Search vendor "Sco"
Open Desktop
Search vendor "Sco" for product "Open Desktop"
3.0
Search vendor "Sco" for product "Open Desktop" and version "3.0"
-
Affected
Sco
Search vendor "Sco"
Openserver
Search vendor "Sco" for product "Openserver"
5.0
Search vendor "Sco" for product "Openserver" and version "5.0"
-
Affected
Sco
Search vendor "Sco"
Unix
Search vendor "Sco" for product "Unix"
3.2v4
Search vendor "Sco" for product "Unix" and version "3.2v4"
-
Affected
Sco
Search vendor "Sco"
Unixware
Search vendor "Sco" for product "Unixware"
2.1
Search vendor "Sco" for product "Unixware" and version "2.1"
-
Affected
Sco
Search vendor "Sco"
Unixware
Search vendor "Sco" for product "Unixware"
7.0
Search vendor "Sco" for product "Unixware" and version "7.0"
-
Affected
Sun
Search vendor "Sun"
Sunos
Search vendor "Sun" for product "Sunos"
5.3
Search vendor "Sun" for product "Sunos" and version "5.3"
-
Affected
Sun
Search vendor "Sun"
Sunos
Search vendor "Sun" for product "Sunos"
5.4
Search vendor "Sun" for product "Sunos" and version "5.4"
-
Affected
Sun
Search vendor "Sun"
Sunos
Search vendor "Sun" for product "Sunos"
5.5
Search vendor "Sun" for product "Sunos" and version "5.5"
-
Affected
Sun
Search vendor "Sun"
Sunos
Search vendor "Sun" for product "Sunos"
5.5.1
Search vendor "Sun" for product "Sunos" and version "5.5.1"
-
Affected
Sun
Search vendor "Sun"
Sunos
Search vendor "Sun" for product "Sunos"
5.6
Search vendor "Sun" for product "Sunos" and version "5.6"
-
Affected