Количество 24
Количество 24
BDU:2025-14391
Уязвимость сервера DNS BIND, связанная с прогнозируемостью в результате наблюдения состояния, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
ROS-20251113-07
Множественные уязвимости bind-dyndb-ldap
ROS-20251113-06
Множественные уязвимости bind
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
CVE-2025-40780
Cache poisoning due to weak PRNG
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Numb ...
GHSA-j3w4-m6qj-vmm5
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
SUSE-SU-2025:4109-1
Security update for bind
SUSE-SU-2025:4108-1
Security update for bind
SUSE-SU-2025:4107-1
Security update for bind
RLSA-2025:21110
Important: bind security update
RLSA-2025:19793
Important: bind9.16 security update
ELSA-2025-21110
ELSA-2025-21110: bind security update (IMPORTANT)
ELSA-2025-19951
ELSA-2025-19951: bind security update (IMPORTANT)
ELSA-2025-19793
ELSA-2025-19793: bind9.16 security update (IMPORTANT)
SUSE-SU-2025:4110-1
Security update for bind
SUSE-SU-2025:3903-1
Security update for bind
RLSA-2025:21111
Important: bind9.18 security update
RLSA-2025:21034
Important: bind security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-14391 Уязвимость сервера DNS BIND, связанная с прогнозируемостью в результате наблюдения состояния, позволяющая нарушителю оказать воздействие на целостность защищаемой информации | CVSS3: 8.6 | 0% Низкий | 2 месяца назад | |
ROS-20251113-07 Множественные уязвимости bind-dyndb-ldap | CVSS3: 8.6 | около 1 месяца назад | ||
ROS-20251113-06 Множественные уязвимости bind | CVSS3: 8.6 | около 1 месяца назад | ||
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40780 Cache poisoning due to weak PRNG | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Numb ... | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
GHSA-j3w4-m6qj-vmm5 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
SUSE-SU-2025:4109-1 Security update for bind | около 1 месяца назад | |||
SUSE-SU-2025:4108-1 Security update for bind | около 1 месяца назад | |||
SUSE-SU-2025:4107-1 Security update for bind | около 1 месяца назад | |||
RLSA-2025:21110 Important: bind security update | 30 дней назад | |||
RLSA-2025:19793 Important: bind9.16 security update | около 2 месяцев назад | |||
ELSA-2025-21110 ELSA-2025-21110: bind security update (IMPORTANT) | 26 дней назад | |||
ELSA-2025-19951 ELSA-2025-19951: bind security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2025-19793 ELSA-2025-19793: bind9.16 security update (IMPORTANT) | около 2 месяцев назад | |||
SUSE-SU-2025:4110-1 Security update for bind | около 1 месяца назад | |||
SUSE-SU-2025:3903-1 Security update for bind | около 2 месяцев назад | |||
RLSA-2025:21111 Important: bind9.18 security update | 30 дней назад | |||
RLSA-2025:21034 Important: bind security update | 30 дней назад |
Уязвимостей на страницу