Page 3 of 11 results (0.010 seconds)
CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0
CVE-2007-3152
https://notcve.org/view.php?id=CVE-2007-3152
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value. c-ares anterior a 1.4.0 utiliza un germen para el generador de númers aleatorios para el campo DNS Transaction ID, el cual podría permitir a atacantes remotos suplantar la respuesta DNS a adivinando el valor del campo. • http://cool.haxx.se/cvs.cgi/curl/ares/CHANGES?rev=HEAD&content-type=text/vnd.viewcvs-markup http://osvdb.org/37171 http://secunia.com/advisories/25579 http://www.securityfocus.com/bid/24386 https://exchange.xforce.ibmcloud.com/vulnerabilities/34979 •