Количество 3
Количество 3

CVE-2001-0328
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.

CVE-2001-0328
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
GHSA-jvrp-wcjq-4xx5
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
Уязвимостей на страницу
| Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
|  | CVE-2001-0328 TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN. | CVSS2: 2.6 | 29%Средний | больше 24 лет назад | 
|  | CVE-2001-0328 TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN. | CVSS2: 5 | 29%Средний | больше 24 лет назад | 
| GHSA-jvrp-wcjq-4xx5 TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN. | 29%Средний | больше 3 лет назад | 
Уязвимостей на страницу







