Количество 7
Количество 7
CVE-2007-3377
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
CVE-2007-3377
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
CVE-2007-3377
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
CVE-2007-3377
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predic ...
GHSA-2mqm-w9vq-9c5r
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
ELSA-2007-0674
ELSA-2007-0674: Moderate: perl-Net-DNS security update (MODERATE)
BDU:2015-03379
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Уязвимостей на страницу
Уязвимость  | CVSS  | EPSS  | Опубликовано  | |
|---|---|---|---|---|
CVE-2007-3377 Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.  | CVSS2: 4.3  | 3% Низкий | больше 18 лет назад | |
CVE-2007-3377 Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.  | 3% Низкий | почти 19 лет назад | ||
CVE-2007-3377 Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.  | CVSS2: 4.3  | 3% Низкий | больше 18 лет назад | |
CVE-2007-3377 Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predic ...  | CVSS2: 4.3  | 3% Низкий | больше 18 лет назад | |
GHSA-2mqm-w9vq-9c5r Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.  | 3% Низкий | больше 3 лет назад | ||
ELSA-2007-0674 ELSA-2007-0674: Moderate: perl-Net-DNS security update (MODERATE)  | больше 18 лет назад | |||
BDU:2015-03379 Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации  | CVSS2: 5  | больше 18 лет назад | 
Уязвимостей на страницу