Логотип exploitDog
bind:CVE-2022-33989
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-33989

Количество 2

Количество 2

nvd логотип

CVE-2022-33989

больше 3 лет назад

dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-jrgj-6p6v-gf22

больше 3 лет назад

dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-33989

dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-jrgj-6p6v-gf22

dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу