An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: BIND(2 tweets) Linux(2 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
threatintelctr | https://nvd.nist.gov/vuln/detail/CVE-2020-8618 | Source threatintelctr 1578372615558799362 | 2022/10/07 |
WolfgangSesin | http://www.sesin.at | Source WolfgangSesin 1578392320206151681 | 2022/10/07 |
WolfgangSesin | https://www.sesin.at/2022/10/07/cve-2020-8618-bind-leap-ste... | Source WolfgangSesin 1578392320206151681 | 2022/10/07 |
www_sesin_at | http://www.sesin.at | Source www_sesin_at 1578392322483671040 | 2022/10/07 |
www_sesin_at | https://www.sesin.at/2022/10/07/cve-2020-8618-bind-leap-ste... | Source www_sesin_at 1578392322483671040 | 2022/10/07 |
RemotelyAlerts | http://alerts.remotelyrmm.com/CVE-2020-8618 | Source RemotelyAlerts 1578392619712847873 | 2022/10/07 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
www.jpcert.or.jp | 7 |
jprs.jp | 5 |
security.sios.com | 5 |
kb.isc.org | 4 |
twitter.com | 3 |
User | URL | Info Source |
---|---|---|
threatintelctr | nvd.nist.gov | Show Tweet |
WolfgangSesin | sesin.at | Show Tweet |
WolfgangSesin | sesin.at | Show Tweet |
www_sesin_at | sesin.at | Show Tweet |
www_sesin_at | sesin.at | Show Tweet |
RemotelyAlerts | alerts.remotelyrmm.com | Show Tweet |
Name | URL |
---|---|
No Data |
Name | URL |
---|---|
No Data |