VYPR
Unrated severityNVD Advisory· Published Jun 27, 2001· Updated Apr 16, 2026

CVE-2001-0328

CVE-2001-0328

Description

TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.