Логотип exploitDog
bind:CVE-2024-52616
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-52616

Количество 10

Количество 10

ubuntu логотип

CVE-2024-52616

около 1 года назад

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2024-52616

около 1 года назад

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2024-52616

около 1 года назад

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2024-52616

11 месяцев назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2024-52616

около 1 года назад

A flaw was found in the Avahi-daemon, where it initializes DNS transac ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4386-1

около 1 года назад

Security update for avahi

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4282-1

около 1 года назад

Security update for avahi

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4196-1

около 1 года назад

Security update for avahi

EPSS: Низкий
rocky логотип

RLSA-2025:7437

3 месяца назад

Moderate: avahi security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7437

8 месяцев назад

ELSA-2025-7437: avahi security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-52616

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-52616

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-52616

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
0%
Низкий
около 1 года назад
msrc логотип
CVSS3: 5.3
0%
Низкий
11 месяцев назад
debian логотип
CVE-2024-52616

A flaw was found in the Avahi-daemon, where it initializes DNS transac ...

CVSS3: 5.3
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:4386-1

Security update for avahi

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:4282-1

Security update for avahi

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:4196-1

Security update for avahi

0%
Низкий
около 1 года назад
rocky логотип
RLSA-2025:7437

Moderate: avahi security update

0%
Низкий
3 месяца назад
oracle-oval логотип
ELSA-2025-7437

ELSA-2025-7437: avahi security update (MODERATE)

8 месяцев назад

Уязвимостей на страницу