Количество 25
Количество 25
BDU:2025-14391
Уязвимость сервера DNS BIND, связанная с прогнозируемостью в результате наблюдения состояния, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
ROS-20251113-07
Множественные уязвимости bind-dyndb-ldap
ROS-20251113-06
Множественные уязвимости bind
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
CVE-2025-40780
Cache poisoning due to weak PRNG
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Numb ...
GHSA-j3w4-m6qj-vmm5
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
SUSE-SU-2025:4109-1
Security update for bind
SUSE-SU-2025:4108-1
Security update for bind
SUSE-SU-2025:4107-1
Security update for bind
RLSA-2025:21110
Important: bind security update
RLSA-2025:19793
Important: bind9.16 security update
ELSA-2025-21110
ELSA-2025-21110: bind security update (IMPORTANT)
ELSA-2025-19951
ELSA-2025-19951: bind security update (IMPORTANT)
ELSA-2025-19793
ELSA-2025-19793: bind9.16 security update (IMPORTANT)
openSUSE-SU-2026:20039-1
Security update for bind
SUSE-SU-2025:4110-1
Security update for bind
SUSE-SU-2025:3903-1
Security update for bind
RLSA-2025:21111
Important: bind9.18 security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-14391 Уязвимость сервера DNS BIND, связанная с прогнозируемостью в результате наблюдения состояния, позволяющая нарушителю оказать воздействие на целостность защищаемой информации | CVSS3: 8.6 | 0% Низкий | 4 месяца назад | |
ROS-20251113-07 Множественные уязвимости bind-dyndb-ldap | CVSS3: 8.6 | 3 месяца назад | ||
ROS-20251113-06 Множественные уязвимости bind | CVSS3: 8.6 | 3 месяца назад | ||
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | 4 месяца назад | |
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | 4 месяца назад | |
CVE-2025-40780 Cache poisoning due to weak PRNG | CVSS3: 8.6 | 0% Низкий | 3 месяца назад | |
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Numb ... | CVSS3: 8.6 | 0% Низкий | 4 месяца назад | |
GHSA-j3w4-m6qj-vmm5 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | 4 месяца назад | |
SUSE-SU-2025:4109-1 Security update for bind | 3 месяца назад | |||
SUSE-SU-2025:4108-1 Security update for bind | 3 месяца назад | |||
SUSE-SU-2025:4107-1 Security update for bind | 3 месяца назад | |||
RLSA-2025:21110 Important: bind security update | 3 месяца назад | |||
RLSA-2025:19793 Important: bind9.16 security update | 3 месяца назад | |||
ELSA-2025-21110 ELSA-2025-21110: bind security update (IMPORTANT) | 2 месяца назад | |||
ELSA-2025-19951 ELSA-2025-19951: bind security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-19793 ELSA-2025-19793: bind9.16 security update (IMPORTANT) | 3 месяца назад | |||
openSUSE-SU-2026:20039-1 Security update for bind | 21 день назад | |||
SUSE-SU-2025:4110-1 Security update for bind | 3 месяца назад | |||
SUSE-SU-2025:3903-1 Security update for bind | 3 месяца назад | |||
RLSA-2025:21111 Important: bind9.18 security update | 3 месяца назад |
Уязвимостей на страницу