Cookie Consent by Free Privacy Policy Generator Aktuallisiere deine Cookie Einstellungen πŸ“Œ CVE-2022-3204
Team IT Security Nachrichtenportal Logo


πŸ“š CVE-2022-3204


πŸ’‘ Newskategorie: SicherheitslΓΌcken
πŸ”— Quelle: web.nvd.nist.gov

A vulnerability named 'Non-Responsive Delegation Attack' (NRDelegation Attack) has been discovered in various DNS resolving software. The NRDelegation Attack works by having a malicious delegation with a considerable number of non responsive nameservers. The attack starts by querying a resolver for a record that relies on those unresponsive nameservers. The attack can cause a resolver to spend a lot of time/resources resolving records under a malicious delegation point where a considerable number of unresponsive NS records reside. It can trigger high CPU usage in some resolver implementations that continually look in the cache for resolved NS records in that delegation. This can lead to degraded performance and eventually denial of service in orchestrated attacks. Unbound does not suffer from high CPU usage, but resources are still needed for resolving the malicious delegation. Unbound will keep trying to resolve the record until hard limits are reached. Based on the nature of the attack and the replies, different limits could be reached. From version 1.16.3 on, Unbound introduces fixes for better performance when under load, by cutting opportunistic queries for nameserver discovery and DNSKEY prefetching and limiting the number of times a delegation point can issue a cache lookup for missing records. ...



πŸ“Œ Bugtraq: Advisory - Sourcetree - CVE-2017-14592 CVE-2017-14593 CVE-2017-14592 CVE-2017-17831


πŸ“ˆ 3.97 Punkte

πŸ“Œ Bugtraq: CVE-2016-9277,CVE-2016-9966,CVE-2016-9967: Possible Privilege Escalation in telecom


πŸ“ˆ 2.98 Punkte

πŸ“Œ Bugtraq: CVE-2016-9277,CVE-2016-9966,CVE-2016-9967: Possible Privilege Escalation in telecom


πŸ“ˆ 2.98 Punkte

πŸ“Œ Multiple Security Updates Affecting TCP/IP:β€― CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086


πŸ“ˆ 2.98 Punkte

πŸ“Œ Multiple Security Updates Affecting TCP/IP:β€― CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086


πŸ“ˆ 2.98 Punkte

πŸ“Œ Microsoft patches three exploited zero-days (CVE-2023-21715, CVE-2023-23376, CVE-2023-21823)


πŸ“ˆ 2.98 Punkte

πŸ“Œ Multiple Security Updates Affecting TCP/IP:β€― CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086


πŸ“ˆ 2.98 Punkte

πŸ“Œ Bugtraq: CVE-2015-7944, CVE-2015-7945 - Ganeti Security Advisory (DoS, Unauthenticated Info Leak)


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778


πŸ“ˆ 1.98 Punkte

πŸ“Œ [papers] - Roaming Through the OpenSSH Client: CVE-2016-0777 and CVE-2016-0778


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: [CVE-2016-0602, CVE-2016-0603] Executable installers are vulnerable^WEVIL (case 24): Oracle Java 6/7/8 SE and VirtualBox


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: Re: [FD] [CVE-2016-0602, CVE-2016-0603] Executable installers are vulnerable^WEVIL (case 24): Oracle Java 6/7/8 SE and VirtualBox


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: CVE-2015-0061 and CVE-2015-0063 (MS16-009/MS16-011)


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: [CVE-2016-1014, CVE-2016-4247] Executable installers are vulnerable^WEVIL (case 35): Adobe's Flash Player (un)installers


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: MySQL / MariaDB / PerconaDB - Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch)


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: CVE-2015-7944, CVE-2015-7945 - Ganeti Security Advisory (DoS, Unauthenticated Info Leak)


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778


πŸ“ˆ 1.98 Punkte

πŸ“Œ [papers] - Roaming Through the OpenSSH Client: CVE-2016-0777 and CVE-2016-0778


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: [CVE-2016-0602, CVE-2016-0603] Executable installers are vulnerable^WEVIL (case 24): Oracle Java 6/7/8 SE and VirtualBox


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: Re: [FD] [CVE-2016-0602, CVE-2016-0603] Executable installers are vulnerable^WEVIL (case 24): Oracle Java 6/7/8 SE and VirtualBox


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: CVE-2015-0061 and CVE-2015-0063 (MS16-009/MS16-011)


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: [CVE-2016-1014, CVE-2016-4247] Executable installers are vulnerable^WEVIL (case 35): Adobe's Flash Player (un)installers


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: MySQL / MariaDB / PerconaDB - Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch)


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: Multiple Vulnerabilities in ASUS Routers [CVE-2017-5891 and CVE-2017-5892]


πŸ“ˆ 1.98 Punkte

πŸ“Œ Is CVE-2017-0199 the new CVE-2012-0158?


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: Datto Windows Agent 1.0.5.0 Remote Command Execution [CVE-2017-16673][CVE-2017-16674]


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: Advisory - Bamboo - CVE-2017-14589 CVE-2017-14590


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)


πŸ“ˆ 1.98 Punkte

πŸ“Œ Bugtraq: [CVE-2018-3667, CVE-2018-3668] Escalation of priviilege via executable installer of Intel Processor Diagnostic Tool


πŸ“ˆ 1.98 Punkte

πŸ“Œ Mozilla Firefox CVE-2007-2175 memory corruption [CVE-2007-2176]


πŸ“ˆ 1.98 Punkte

πŸ“Œ Loading up a pair of Qt bugs: Detailing CVE-2019-1636 and CVE-2019-6739


πŸ“ˆ 1.98 Punkte

πŸ“Œ flatpak: CVE-2019-8308: vulnerability similar to runc CVE-2019-5736 involving /proc/self/exe


πŸ“ˆ 1.98 Punkte











matomo