We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Advisory GHSA-h92q-fgpp-qhrq references a vulnerability in the following Go modules:
Description: CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack.
References:
Cross references:
See doc/quickstart.md for instructions on how to triage this report.
id: GO-ID-PENDING modules: - module: github.com/coredns/coredns vulnerable_at: 1.11.3 summary: CoreDNS Cache Poisoning via a birthday attack in github.com/coredns/coredns cves: - CVE-2023-30464 ghsas: - GHSA-h92q-fgpp-qhrq references: - advisory: https://github.com/advisories/GHSA-h92q-fgpp-qhrq - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-30464 - web: https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba source: id: GHSA-h92q-fgpp-qhrq created: 2024-09-18T23:01:25.16426641Z review_status: UNREVIEWED
The text was updated successfully, but these errors were encountered:
Change https://go.dev/cl/614081 mentions this issue: data/reports: add GO-2024-3134
data/reports: add GO-2024-3134
Sorry, something went wrong.
74aba44
Change https://go.dev/cl/616058 mentions this issue: data/reports: update GO-2024-3134
data/reports: update GO-2024-3134
ce0a8b8
- data/reports/GO-2024-3134.yaml Updates #3134 Fixes #3159 Change-Id: Ic39b8e8695e8a759860ddffae684465ad64999db Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/616058 Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
zpavlinovic
No branches or pull requests
Advisory GHSA-h92q-fgpp-qhrq references a vulnerability in the following Go modules:
Description:
CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack.
References:
Cross references:
See doc/quickstart.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: