Browse all 10 CVE security advisories affecting coredns. AI-powered Chinese analysis, POCs, and references for each vulnerability.
CoreDNS serves as a flexible DNS server and proxy, widely used in Kubernetes environments for service discovery and DNS resolution. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and insecure default configurations. While no major public incidents have been widely documented, the 10 recorded CVEs highlight potential risks in plugin handling and memory management. Security characteristics include a modular plugin architecture that can introduce attack surfaces, though regular updates and proper configuration mitigate many threats. The project maintains a responsive security team, but administrators should remain vigilant about plugin dependencies and access controls to prevent exploitation.
This page lists every published CVE security advisory associated with coredns. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.