Total vulnerabilities in the database
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.
Software | From | Fixed in |
---|---|---|
isc / bind | 8.2 | 8.2.x |
gnu / glibc | 2.1.2 | 2.1.2.x |
isc / bind | 8.2.1 | 8.2.1.x |
gnu / glibc | 2.1.1 | 2.1.1.x |
gnu / glibc | 2.0 | 2.0.x |
gnu / glibc | 2.1 | 2.1.x |
isc / bind | 8.2.2 | 8.2.2.x |
gnu / glibc | 2.1.3 | 2.1.3.x |