Количество 10
Количество 10
CVE-2020-8620
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
CVE-2020-8620
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
CVE-2020-8620
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
CVE-2020-8620
In BIND 9.15.6 -> 9.16.5 9.17.0 -> 9.17.3 An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure causing the server to exit.
CVE-2020-8620
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establ ...
GHSA-p5fp-cw6q-m6xc
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
BDU:2021-02674
Уязвимость библиотеки libuv DNS-сервера Bind9, позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2020:1701-1
Security update for bind
openSUSE-SU-2020:1699-1
Security update for bind
SUSE-SU-2020:2914-1
Security update for bind
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-8620 In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit. | CVSS3: 7.5 | 7% Низкий | больше 5 лет назад | |
CVE-2020-8620 In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit. | CVSS3: 7.5 | 7% Низкий | больше 5 лет назад | |
CVE-2020-8620 In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit. | CVSS3: 7.5 | 7% Низкий | больше 5 лет назад | |
CVE-2020-8620 In BIND 9.15.6 -> 9.16.5 9.17.0 -> 9.17.3 An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure causing the server to exit. | CVSS3: 7.5 | 7% Низкий | больше 5 лет назад | |
CVE-2020-8620 In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establ ... | CVSS3: 7.5 | 7% Низкий | больше 5 лет назад | |
GHSA-p5fp-cw6q-m6xc In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit. | CVSS3: 7.5 | 7% Низкий | больше 3 лет назад | |
BDU:2021-02674 Уязвимость библиотеки libuv DNS-сервера Bind9, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 7% Низкий | больше 5 лет назад | |
openSUSE-SU-2020:1701-1 Security update for bind | больше 5 лет назад | |||
openSUSE-SU-2020:1699-1 Security update for bind | больше 5 лет назад | |||
SUSE-SU-2020:2914-1 Security update for bind | больше 5 лет назад |
Уязвимостей на страницу