Количество 6
Количество 6
CVE-2025-30192
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
CVE-2025-30192
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
CVE-2025-30192
An attacker spoofing answers to ECS enabled requests sent out by the R ...
GHSA-ph6c-ph44-jm63
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
BDU:2025-12940
Уязвимость DNS-сервера PowerDNS Recursor, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю проводить спуфинг-атаки
ROS-20251007-03
Уязвимость pdns-recursor
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-30192 An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled. | CVSS3: 7.5 | 0% Низкий | 6 месяцев назад | |
CVE-2025-30192 An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled. | CVSS3: 7.5 | 0% Низкий | 6 месяцев назад | |
CVE-2025-30192 An attacker spoofing answers to ECS enabled requests sent out by the R ... | CVSS3: 7.5 | 0% Низкий | 6 месяцев назад | |
GHSA-ph6c-ph44-jm63 An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled. | CVSS3: 7.5 | 0% Низкий | 6 месяцев назад | |
BDU:2025-12940 Уязвимость DNS-сервера PowerDNS Recursor, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю проводить спуфинг-атаки | CVSS3: 7.5 | 0% Низкий | 6 месяцев назад | |
ROS-20251007-03 Уязвимость pdns-recursor | CVSS3: 7.5 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу