Количество 7
Количество 7

CVE-2007-3377
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

CVE-2007-3377
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

CVE-2007-3377
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
CVE-2007-3377
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predic ...
GHSA-2mqm-w9vq-9c5r
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
ELSA-2007-0674
ELSA-2007-0674: Moderate: perl-Net-DNS security update (MODERATE)

BDU:2015-03379
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2007-3377 Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. | CVSS2: 4.3 | 3% Низкий | около 18 лет назад |
![]() | CVE-2007-3377 Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. | 3% Низкий | больше 18 лет назад | |
![]() | CVE-2007-3377 Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. | CVSS2: 4.3 | 3% Низкий | около 18 лет назад |
CVE-2007-3377 Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predic ... | CVSS2: 4.3 | 3% Низкий | около 18 лет назад | |
GHSA-2mqm-w9vq-9c5r Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. | 3% Низкий | больше 3 лет назад | ||
ELSA-2007-0674 ELSA-2007-0674: Moderate: perl-Net-DNS security update (MODERATE) | около 18 лет назад | |||
![]() | BDU:2015-03379 Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации | CVSS2: 5 | около 18 лет назад |
Уязвимостей на страницу