CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates b
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates b
Cross-site scripting (XSS) vulnerability in FreeScripts VisitorBook LE (visitorbook.pl) allows remot
FreeScripts VisitorBook LE (visitorbook.pl) logs the reverse DNS name of a visiting host, which allo
FON La Fonera routers do not properly limit DNS service access by unauthenticated clients, which all
MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to
dnsserver in Cisco Application Control Engine Global Site Selector (GSS) before 3.0(1) allows remote
Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of ser
Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS d
MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the abil
The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restric
MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricti
An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messag
A vulnerability was found in OpenDNS OpenResolve. It has been rated as problematic. Affected by this
A vulnerability classified as problematic has been found in OpenDNS OpenResolve. This affects an unk
The web interface on the Technicolor TC7230 STEB 01.25 is vulnerable to DNS rebinding, which allows
OpenLambda 2019-09-10 allows DNS rebinding attacks against the OL server for the REST API on TCP por
Windows DNS Query Information Disclosure Vulnerability
A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and
A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attacker
The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matche