Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-77x3-jh2q-2qvx

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.

c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.

EPSS

Процентиль: 75%
0.00877
Низкий

Связанные уязвимости

nvd
больше 18 лет назад

c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.

EPSS

Процентиль: 75%
0.00877
Низкий