Количество 24
Количество 24
BDU:2025-14391
Уязвимость сервера DNS BIND, связанная с прогнозируемостью в результате наблюдения состояния, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
CVE-2025-40780
Cache poisoning due to weak PRNG
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Numb ...
GHSA-j3w4-m6qj-vmm5
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
SUSE-SU-2025:4109-1
Security update for bind
SUSE-SU-2025:4108-1
Security update for bind
SUSE-SU-2025:4107-1
Security update for bind
RLSA-2025:21110
Important: bind security update
RLSA-2025:19793
Important: bind9.16 security update
ELSA-2025-21110
ELSA-2025-21110: bind security update (IMPORTANT)
ELSA-2025-19951
ELSA-2025-19951: bind security update (IMPORTANT)
ELSA-2025-19793
ELSA-2025-19793: bind9.16 security update (IMPORTANT)
SUSE-SU-2025:4110-1
Security update for bind
SUSE-SU-2025:3903-1
Security update for bind
RLSA-2025:21111
Important: bind9.18 security update
RLSA-2025:21034
Important: bind security update
ELSA-2025-21111
ELSA-2025-21111: bind9.18 security update (IMPORTANT)
ELSA-2025-21034
ELSA-2025-21034: bind security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-14391 Уязвимость сервера DNS BIND, связанная с прогнозируемостью в результате наблюдения состояния, позволяющая нарушителю оказать воздействие на целостность защищаемой информации | CVSS3: 8.6 | 0% Низкий | 2 месяца назад | |
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40780 Cache poisoning due to weak PRNG | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Numb ... | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
GHSA-j3w4-m6qj-vmm5 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
SUSE-SU-2025:4109-1 Security update for bind | около 1 месяца назад | |||
SUSE-SU-2025:4108-1 Security update for bind | около 1 месяца назад | |||
SUSE-SU-2025:4107-1 Security update for bind | около 1 месяца назад | |||
RLSA-2025:21110 Important: bind security update | 30 дней назад | |||
RLSA-2025:19793 Important: bind9.16 security update | около 2 месяцев назад | |||
ELSA-2025-21110 ELSA-2025-21110: bind security update (IMPORTANT) | 27 дней назад | |||
ELSA-2025-19951 ELSA-2025-19951: bind security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2025-19793 ELSA-2025-19793: bind9.16 security update (IMPORTANT) | около 2 месяцев назад | |||
SUSE-SU-2025:4110-1 Security update for bind | около 1 месяца назад | |||
SUSE-SU-2025:3903-1 Security update for bind | около 2 месяцев назад | |||
RLSA-2025:21111 Important: bind9.18 security update | 30 дней назад | |||
RLSA-2025:21034 Important: bind security update | 30 дней назад | |||
ELSA-2025-21111 ELSA-2025-21111: bind9.18 security update (IMPORTANT) | 27 дней назад | |||
ELSA-2025-21034 ELSA-2025-21034: bind security update (IMPORTANT) | 20 дней назад |
Уязвимостей на страницу