Definition ID | Class | Title | Last Modified |
---|
oval:org.opensuse.security:def:20100290 | V | CVE-2010-0290 | 2022-05-20 |
oval:org.mitre.oval:def:13187 | P | DSA-2054-1 bind9 -- DNS cache poisoning | 2015-02-23 |
oval:org.mitre.oval:def:13115 | P | DSA-2054-2 bind9 -- DNS cache poisoning | 2015-02-23 |
oval:org.mitre.oval:def:13497 | P | USN-888-1 -- bind9 vulnerabilities | 2014-06-30 |
oval:org.mitre.oval:def:11783 | P | DSA-2054 bind9 -- DNS cache poisoning | 2014-06-23 |
oval:org.mitre.oval:def:22749 | P | ELSA-2010:0062: bind security update (Moderate) | 2014-05-26 |
oval:org.mitre.oval:def:6815 | V | HP-UX Running BIND, Remote Denial of Service (DoS), Unauthorized Disclosure of Information | 2014-03-24 |
oval:org.mitre.oval:def:21912 | P | RHSA-2010:0062: bind security update (Moderate) | 2014-02-24 |
oval:org.mitre.oval:def:7512 | V | ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability | 2014-01-20 |
oval:org.mitre.oval:def:8884 | V | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022. | 2013-04-29 |
oval:org.debian:def:2054 | V | DNS cache poisoning | 2010-06-04 |
oval:com.redhat.rhsa:def:20100062 | P | RHSA-2010:0062: bind security update (Moderate) | 2010-01-20 |