Filtered by vendor Technitium
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-48256 | 1 Technitium | 1 Dns Server | 2024-11-21 | N/A | 7.5 HIGH |
Technitium DNS Server before 10.0 allows a self-CNAME denial-of-service attack in which a CNAME loop causes an answer to contain hundreds of records. | |||||
CVE-2022-30258 | 1 Technitium | 1 Dns Server | 2024-11-21 | N/A | 9.8 CRITICAL |
An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V2 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names. | |||||
CVE-2022-30257 | 1 Technitium | 1 Dns Server | 2024-11-21 | N/A | 9.8 CRITICAL |
An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names. | |||||
CVE-2021-43105 | 1 Technitium | 1 Dns Server | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
A vulnerability in the bailiwick checking function in Technitium DNS Server <= v7.0 exists that allows specific malicious users to inject `NS` records of any domain (even TLDs) into the cache and conduct a DNS cache poisoning attack. |