Количество 33
Количество 33
SUSE-SU-2025:4109-1
Security update for bind
SUSE-SU-2025:4108-1
Security update for bind
SUSE-SU-2025:4107-1
Security update for bind
RLSA-2025:21110
Important: bind security update
RLSA-2025:19793
Important: bind9.16 security update
ELSA-2025-21110
ELSA-2025-21110: bind security update (IMPORTANT)
ELSA-2025-19951
ELSA-2025-19951: bind security update (IMPORTANT)
ELSA-2025-19793
ELSA-2025-19793: bind9.16 security update (IMPORTANT)
SUSE-SU-2025:4110-1
Security update for bind
SUSE-SU-2025:3903-1
Security update for bind
RLSA-2025:21111
Important: bind9.18 security update
RLSA-2025:21034
Important: bind security update
ELSA-2025-21111
ELSA-2025-21111: bind9.18 security update (IMPORTANT)
ELSA-2025-21034
ELSA-2025-21034: bind security update (IMPORTANT)
ELSA-2025-19950
ELSA-2025-19950: bind9.18 security update (IMPORTANT)
ELSA-2025-19912
ELSA-2025-19912: bind security update (IMPORTANT)
ROS-20251113-07
Множественные уязвимости bind-dyndb-ldap
ROS-20251113-06
Множественные уязвимости bind
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2025:4109-1 Security update for bind | около 1 месяца назад | |||
SUSE-SU-2025:4108-1 Security update for bind | около 1 месяца назад | |||
SUSE-SU-2025:4107-1 Security update for bind | около 1 месяца назад | |||
RLSA-2025:21110 Important: bind security update | 30 дней назад | |||
RLSA-2025:19793 Important: bind9.16 security update | около 1 месяца назад | |||
ELSA-2025-21110 ELSA-2025-21110: bind security update (IMPORTANT) | 26 дней назад | |||
ELSA-2025-19951 ELSA-2025-19951: bind security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2025-19793 ELSA-2025-19793: bind9.16 security update (IMPORTANT) | около 2 месяцев назад | |||
SUSE-SU-2025:4110-1 Security update for bind | около 1 месяца назад | |||
SUSE-SU-2025:3903-1 Security update for bind | около 2 месяцев назад | |||
RLSA-2025:21111 Important: bind9.18 security update | 30 дней назад | |||
RLSA-2025:21034 Important: bind security update | 30 дней назад | |||
ELSA-2025-21111 ELSA-2025-21111: bind9.18 security update (IMPORTANT) | 26 дней назад | |||
ELSA-2025-21034 ELSA-2025-21034: bind security update (IMPORTANT) | 19 дней назад | |||
ELSA-2025-19950 ELSA-2025-19950: bind9.18 security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2025-19912 ELSA-2025-19912: bind security update (IMPORTANT) | около 2 месяцев назад | |||
ROS-20251113-07 Множественные уязвимости bind-dyndb-ldap | CVSS3: 8.6 | около 1 месяца назад | ||
ROS-20251113-06 Множественные уязвимости bind | CVSS3: 8.6 | около 1 месяца назад | ||
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40780 In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | CVSS3: 8.6 | 0% Низкий | около 2 месяцев назад |
Уязвимостей на страницу