Количество 6
Количество 6
CVE-2025-30192
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
CVE-2025-30192
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
CVE-2025-30192
An attacker spoofing answers to ECS enabled requests sent out by the R ...
ROS-20251007-03
Уязвимость pdns-recursor
GHSA-ph6c-ph44-jm63
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
BDU:2025-12940
Уязвимость DNS-сервера PowerDNS Recursor, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю проводить спуфинг-атаки
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-30192 An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-30192 An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-30192 An attacker spoofing answers to ECS enabled requests sent out by the R ... | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
ROS-20251007-03 Уязвимость pdns-recursor | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
GHSA-ph6c-ph44-jm63 An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
BDU:2025-12940 Уязвимость DNS-сервера PowerDNS Recursor, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю проводить спуфинг-атаки | CVSS3: 7.5 | 0% Низкий | 4 месяца назад |
Уязвимостей на страницу