Known Vulnerabilities for Dhcpd by Isc

Listed below are 8 of the newest known vulnerabilities associated with "Dhcpd" by "Isc".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2019-6470 There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. ... 7.5 - HIGH 2019-11-01 2019-11-06
CVE-2006-3122 The supersede_lease function in memory.c in ISC DHCP (dhcpd) server 2.0pl5 allows remote attackers to cause a denial of servi... 5 - MEDIUM 2006-08-09 2011-06-13
CVE-2004-1006 Format string vulnerability in the log functions in dhcpd for dhcp 2.x allows remote DNS servers to execute arbitrary code vi... 10 - HIGH 2005-03-01 2017-07-11
CVE-2004-0461 The DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13, when compiled in environments that do not provide the vsnprintf... 10 - HIGH 2004-08-06 2017-07-11
CVE-2004-0460 Buffer overflow in the logging capability for the DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13 allows remote atta... 10 - HIGH 2004-08-06 2017-07-11
CVE-2003-0039 ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of servi... 5 - MEDIUM 2003-02-07 2017-10-10
CVE-2003-0026 Multiple stack-based buffer overflows in the error handling routines of the minires library, as used in the NSUPDATE capabili... 7.5 - HIGH 2003-01-17 2017-07-11
CVE-2002-0702 Format string vulnerabilities in the logging routines for dynamic DNS code (print.c) of ISC DHCP daemon (DHCPD) 3 to 3.0.1rc8... 10 - HIGH 2002-07-26 2016-10-18

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationIscDhcpd4.4.1AllAllAll
ApplicationIscDhcpd3.0_pl2AllAllAll
ApplicationIscDhcpd3.0_pl1AllAllAll
ApplicationIscDhcpd3.0_b2pl9AllAllAll
ApplicationIscDhcpd3.0_b2pl23AllAllAll
ApplicationIscDhcpd3.0.1rc3AllAll
ApplicationIscDhcpd3.0.1rc9AllAll
ApplicationIscDhcpd3.0.1rc8AllAll
ApplicationIscDhcpd3.0.1rc7AllAll
ApplicationIscDhcpd3.0.1rc6AllAll
ApplicationIscDhcpd3.0.1rc5AllAll
ApplicationIscDhcpd3.0.1rc4AllAll
ApplicationIscDhcpd3.0.1rc2AllAll
ApplicationIscDhcpd3.0.1rc14AllAll
ApplicationIscDhcpd3.0.1rc13AllAll
ApplicationIscDhcpd3.0.1rc12AllAll
ApplicationIscDhcpd3.0.1rc11AllAll
ApplicationIscDhcpd3.0.1rc10AllAll
ApplicationIscDhcpd3.0.1rc1AllAll
ApplicationIscDhcpd3.0AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report