Количество 12
Количество 12
CVE-2024-52616
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
CVE-2024-52616
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
CVE-2024-52616
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
CVE-2024-52616
Avahi: avahi wide-area dns predictable transaction ids
CVE-2024-52616
A flaw was found in the Avahi-daemon, where it initializes DNS transac ...
SUSE-SU-2024:4386-1
Security update for avahi
SUSE-SU-2024:4282-1
Security update for avahi
SUSE-SU-2024:4196-1
Security update for avahi
RLSA-2025:7437
Moderate: avahi security update
ELSA-2025-7437
ELSA-2025-7437: avahi security update (MODERATE)
BDU:2026-03600
Уязвимость системы обнаружения сервисов в локальной сети Avahi, связанная с недостаточной энтропией в именах ресурсов, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
ROS-20260209-73-0002
Уязвимость avahi
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-52616 A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2024-52616 A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2024-52616 A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2024-52616 Avahi: avahi wide-area dns predictable transaction ids | CVSS3: 5.3 | 0% Низкий | около 1 года назад | |
CVE-2024-52616 A flaw was found in the Avahi-daemon, where it initializes DNS transac ... | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2024:4386-1 Security update for avahi | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2024:4282-1 Security update for avahi | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2024:4196-1 Security update for avahi | 0% Низкий | больше 1 года назад | ||
RLSA-2025:7437 Moderate: avahi security update | 0% Низкий | 6 месяцев назад | ||
ELSA-2025-7437 ELSA-2025-7437: avahi security update (MODERATE) | 11 месяцев назад | |||
BDU:2026-03600 Уязвимость системы обнаружения сервисов в локальной сети Avahi, связанная с недостаточной энтропией в именах ресурсов, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
ROS-20260209-73-0002 Уязвимость avahi | CVSS3: 5.3 | 0% Низкий | около 2 месяцев назад |
Уязвимостей на страницу