Total vulnerabilities in the database
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
Software | From | Fixed in |
---|---|---|
daniel_stenberg / c-ares | 1.3 | 1.3.x |
daniel_stenberg / c-ares | 1.0 | 1.0.x |
daniel_stenberg / c-ares | 1.3.2 | 1.3.2.x |
daniel_stenberg / c-ares | 1.2.1 | 1.2.1.x |
daniel_stenberg / c-ares | 1.2 | 1.2.x |
daniel_stenberg / c-ares | 1.3.1 | 1.3.1.x |
daniel_stenberg / c-ares | 1.1 | 1.1.x |