Логотип exploitDog
bind:CVE-2007-3152
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-3152

Количество 2

Количество 2

nvd логотип

CVE-2007-3152

больше 18 лет назад

c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-77x3-jh2q-2qvx

почти 4 года назад

c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2007-3152

c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.

CVSS2: 7.5
1%
Низкий
больше 18 лет назад
github логотип
GHSA-77x3-jh2q-2qvx

c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.

1%
Низкий
почти 4 года назад

Уязвимостей на страницу