Логотип exploitDog
bind:"CVE-2021-25220" OR bind:"CVE-2022-0396"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-25220" OR bind:"CVE-2022-0396"

Количество 31

Количество 31

rocky логотип

RLSA-2022:8068

около 3 лет назад

Moderate: bind security update

EPSS: Низкий
rocky логотип

RLSA-2022:7643

около 3 лет назад

Important: bind9.16 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-8068

около 3 лет назад

ELSA-2022-8068: bind security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-7643

около 3 лет назад

ELSA-2022-7643: bind9.16 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2713-1

больше 3 лет назад

Security update for bind

EPSS: Низкий
redos логотип

ROS-20230414-02

больше 2 лет назад

Множественные уязвимости BIND

CVSS3: 8.6
EPSS: Низкий
ubuntu логотип

CVE-2022-0396

почти 4 года назад

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2022-0396

почти 4 года назад

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2022-0396

почти 4 года назад

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2022-0396

почти 4 года назад

DoS from specifically crafted TCP packets

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2022-0396

почти 4 года назад

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9 ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2021-25220

почти 4 года назад

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.

CVSS3: 6.8
EPSS: Низкий
redhat логотип

CVE-2021-25220

почти 4 года назад

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2021-25220

почти 4 года назад

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.

CVSS3: 6.8
EPSS: Низкий
msrc логотип

CVE-2021-25220

почти 4 года назад

DNS forwarders - cache poisoning vulnerability

CVSS3: 6.8
EPSS: Низкий
debian логотип

CVE-2021-25220

почти 4 года назад

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Support ...

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-wqqg-j8m9-9rcc

почти 4 года назад

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-02158

почти 4 года назад

Уязвимость сервера DNS BIND, связанная с неправильным завершением работы ресурса или его высвобождение, которая приводит к неполной очистке, позволяющая нарушителю вызвать октаз в обслуживании

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0946-1

почти 4 года назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0945-1

почти 4 года назад

Security update for bind

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2022:8068

Moderate: bind security update

около 3 лет назад
rocky логотип
RLSA-2022:7643

Important: bind9.16 security update

около 3 лет назад
oracle-oval логотип
ELSA-2022-8068

ELSA-2022-8068: bind security update (MODERATE)

около 3 лет назад
oracle-oval логотип
ELSA-2022-7643

ELSA-2022-7643: bind9.16 security update (IMPORTANT)

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2713-1

Security update for bind

больше 3 лет назад
redos логотип
ROS-20230414-02

Множественные уязвимости BIND

CVSS3: 8.6
больше 2 лет назад
ubuntu логотип
CVE-2022-0396

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2022-0396

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2022-0396

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
msrc логотип
CVE-2022-0396

DoS from specifically crafted TCP packets

CVSS3: 5.3
0%
Низкий
почти 4 года назад
debian логотип
CVE-2022-0396

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9 ...

CVSS3: 5.3
0%
Низкий
почти 4 года назад
ubuntu логотип
CVE-2021-25220

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.

CVSS3: 6.8
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-25220

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.

CVSS3: 6.8
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-25220

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.

CVSS3: 6.8
0%
Низкий
почти 4 года назад
msrc логотип
CVE-2021-25220

DNS forwarders - cache poisoning vulnerability

CVSS3: 6.8
0%
Низкий
почти 4 года назад
debian логотип
CVE-2021-25220

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Support ...

CVSS3: 6.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-wqqg-j8m9-9rcc

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
fstec логотип
BDU:2023-02158

Уязвимость сервера DNS BIND, связанная с неправильным завершением работы ресурса или его высвобождение, которая приводит к неполной очистке, позволяющая нарушителю вызвать октаз в обслуживании

CVSS3: 5.3
0%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2022:0946-1

Security update for bind

0%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2022:0945-1

Security update for bind

0%
Низкий
почти 4 года назад

Уязвимостей на страницу