4 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

18 Sep 2024 — An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID. • https://coredns.io •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

18 Sep 2024 — CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack. • https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba • CWE-290: Authentication Bypass by Spoofing •

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 0

03 Mar 2023 — A flaw was found in coreDNS. This flaw allows a malicious user to reroute internal calls to some internal services that were accessed by the FQDN in a format of <service>.<namespace>.svc. • https://bugzilla.redhat.com/show_bug.cgi?id=2118542 • CWE-923: Improper Restriction of Communication Channel to Intended Endpoints •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

03 Mar 2023 — A flaw was found in coreDNS. This flaw allows a malicious user to redirect traffic intended for external top-level domains (TLD) to a pod they control by creating projects and namespaces that match the TLD. • https://bugzilla.redhat.com/show_bug.cgi?id=2118543 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') CWE-923: Improper Restriction of Communication Channel to Intended Endpoints •