Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h92q-fgpp-qhrq | CoreDNS Cache Poisoning via a birthday attack |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 19 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Coredns.io
Coredns.io coredns |
|
| Weaknesses | CWE-290 | |
| CPEs | cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Coredns.io
Coredns.io coredns |
|
| Metrics |
cvssV3_1
|
Wed, 18 Sep 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-19T18:19:03.084Z
Reserved: 2023-04-10T00:00:00.000Z
Link: CVE-2023-30464
Updated: 2024-09-19T18:18:53.185Z
Status : Analyzed
Published: 2024-09-18T21:15:13.080
Modified: 2025-07-10T15:56:58.793
Link: CVE-2023-30464
No data.
OpenCVE Enrichment
No data.
Github GHSA