{"vulnerability": "CVE-2022-1183", "sightings": [{"uuid": "b8008f74-0adb-4f94-89f4-8379af10f1c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1183", "type": "seen", "source": "https://t.me/cibsecurity/42970", "content": "\u203c CVE-2022-1183 \u203c\n\nOn vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -&gt; 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-19T14:29:24.000000Z"}]}