Логотип exploitDog
bind:"BDU:2015-03379" OR bind:"CVE-2007-3377"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2015-03379" OR bind:"CVE-2007-3377"

Количество 7

Количество 7

fstec логотип

BDU:2015-03379

около 18 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2007-3377

около 18 лет назад

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2007-3377

больше 18 лет назад

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

EPSS: Низкий
nvd логотип

CVE-2007-3377

около 18 лет назад

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2007-3377

около 18 лет назад

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predic ...

CVSS2: 4.3
EPSS: Низкий
github логотип

GHSA-2mqm-w9vq-9c5r

больше 3 лет назад

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

EPSS: Низкий
oracle-oval логотип

ELSA-2007-0674

около 18 лет назад

ELSA-2007-0674: Moderate: perl-Net-DNS security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2015-03379

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

CVSS2: 5
около 18 лет назад
ubuntu логотип
CVE-2007-3377

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

CVSS2: 4.3
3%
Низкий
около 18 лет назад
redhat логотип
CVE-2007-3377

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

3%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-3377

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

CVSS2: 4.3
3%
Низкий
около 18 лет назад
debian логотип
CVE-2007-3377

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predic ...

CVSS2: 4.3
3%
Низкий
около 18 лет назад
github логотип
GHSA-2mqm-w9vq-9c5r

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

3%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2007-0674

ELSA-2007-0674: Moderate: perl-Net-DNS security update (MODERATE)

около 18 лет назад

Уязвимостей на страницу