|Max CVSS||10.0||Min CVSS||3.3||Total Count||4|
|ID||CVSS||Summary||Last (major) update||Published|
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic vi
|19-02-2017 - 00:21||08-07-2008 - 19:41|
The p_exec_query function in src/dns_query.c in pdnsd before 1.2.7-par allows remote attackers to cause a denial of service (daemon crash) via a long DNS reply with many entries in the answer section, related to a "dangling pointer bug."
|07-03-2011 - 22:12||24-09-2008 - 07:42|
Symantec Scan Engine 220.127.116.11, and possibly other versions before 18.104.22.168, uses a client-side check to verify a password, which allows remote attackers to gain administrator privileges via a modified client that sends certain XML requests.
|07-03-2011 - 21:29||24-04-2006 - 21:02|
chpass in OpenBSD 2.0 through 3.2 allows local users to read portions of arbitrary files via a hard link attack on a temporary file used to store user database information.
|05-09-2008 - 16:36||31-12-2003 - 00:00|