{"uuid": "05cf85dc-8232-4e50-abd1-b3d1dace7072", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32936", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml56jp3x6v2e", "content": "CVE-2026-32936 - CoreDNS DoH GET path missing size validation causes CPU and memory amplification\nCVE ID : CVE-2026-32936\n \n Published : May 5, 2026, 8:16 p.m. | 22\u00a0minutes ago\n \n Description : CoreDNS is a DNS server that chains plugins. In versions prior to 1.14.3, the DNS-o...", "creation_timestamp": "2026-05-05T21:56:42.396686Z"}