Use of Insufficiently Random Values
A vulnerability was found in kapetan dns prior to 7.0.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file "DNS/Protocol/Request.cs". The manipulation leads to insufficient entropy in "prng". The attack may be launched remotely. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216188.
CWE-330 - Use of Insufficiently Random Values
The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.