{"vulnerability": "CVE-2023-28452", "sightings": [{"uuid": "b12ffe41-a30d-4e3a-8b9c-a732ae389b5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28452", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8164", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28452\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID.\n\ud83d\udccf Published: 2024-09-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-19T20:44:07.451Z\n\ud83d\udd17 References:\n1. https://coredns.io/\n2. https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba", "creation_timestamp": "2025-03-19T21:18:40.000000Z"}]}