Логотип exploitDog
bind:CVE-2026-24030
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-24030

Количество 4

Количество 4

ubuntu логотип

CVE-2026-24030

2 дня назад

[Unknown description]

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2026-24030

2 дня назад

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2026-24030

2 дня назад

An attacker might be able to trick DNSdist into allocating too much me ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-v2vv-6q75-rvc9

2 дня назад

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-24030

[Unknown description]

CVSS3: 5.3
0%
Низкий
2 дня назад
nvd логотип
CVE-2026-24030

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.

CVSS3: 5.3
0%
Низкий
2 дня назад
debian логотип
CVE-2026-24030

An attacker might be able to trick DNSdist into allocating too much me ...

CVSS3: 5.3
0%
Низкий
2 дня назад
github логотип
GHSA-v2vv-6q75-rvc9

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.

CVSS3: 5.3
0%
Низкий
2 дня назад

Уязвимостей на страницу