CVE-2025-68151
- EPSS 0.13%
- Veröffentlicht 08.01.2026 15:33:12
- Zuletzt bearbeitet 22.01.2026 13:47:50
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.0, multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or cra...
CVE-2025-47950
- EPSS 0.06%
- Veröffentlicht 06.06.2025 17:32:30
- Zuletzt bearbeitet 15.08.2025 16:24:26
CoreDNS is a DNS server that chains plugins. In versions prior to 1.12.2, a Denial of Service (DoS) vulnerability exists in the CoreDNS DNS-over-QUIC (DoQ) server implementation. The server previously created a new goroutine for every incoming QUIC s...
CVE-2023-30464
- EPSS 0.06%
- Veröffentlicht 18.09.2024 21:15:13
- Zuletzt bearbeitet 10.07.2025 15:56:58
CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack.
CVE-2023-28452
- EPSS 0.04%
- Veröffentlicht 18.09.2024 15:15:13
- Zuletzt bearbeitet 19.03.2025 21:15:33
An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just f...
CVE-2022-2835
- EPSS 0.04%
- Veröffentlicht 03.03.2023 16:15:09
- Zuletzt bearbeitet 07.03.2025 21:15:11
A flaw was found in coreDNS. This flaw allows a malicious user to reroute internal calls to some internal services that were accessed by the FQDN in a format of <service>.<namespace>.svc.
CVE-2022-2837
- EPSS 0.19%
- Veröffentlicht 03.03.2023 16:15:09
- Zuletzt bearbeitet 07.03.2025 19:15:33
A flaw was found in coreDNS. This flaw allows a malicious user to redirect traffic intended for external top-level domains (TLD) to a pod they control by creating projects and namespaces that match the TLD.