Количество 3
Количество 3
CVE-2020-25926
The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet.
GHSA-wvxg-xmpg-qcwx
The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet.
BDU:2021-04220
Уязвимость DNS-клиента стеков TCP/IP NicheLite и InterNiche, позволяющая нарушителю проводить спуфинг-атаки
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-25926 The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet. | CVSS3: 7.5 | 0% Низкий | больше 4 лет назад | |
GHSA-wvxg-xmpg-qcwx The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet. | 0% Низкий | больше 3 лет назад | ||
BDU:2021-04220 Уязвимость DNS-клиента стеков TCP/IP NicheLite и InterNiche, позволяющая нарушителю проводить спуфинг-атаки | CVSS3: 4 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу