{"vulnerability": "CVE-2024-12705", "sightings": [{"uuid": "a9599df1-b99d-445b-b60d-b6eb60dbf14e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:39.982075Z"}, {"uuid": "d4a99d7a-5eea-4529-99c6-3d811a2c480c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://t.me/suboxone_chatroom/7383", "content": "CVE-2024-11187, -12705: Vulnerabilities in BIND DNS Software, 7.5 rating\u2757\ufe0f\n\nTwo vulnerabilities in BIND allow DoS against DNS servers, which can be a preparatory step before the main attacks.\n\nSearch at Netlas.io:\n\ud83d\udc49 Link: https://nt.ls/bGSFv\n\ud83d\udc49 Dork: dns.banner:\"BIND\" OR dns_tcp.banner:\"BIND\"\n\nRead more: https://kb.isc.org/docs/cve-2024-12705", "creation_timestamp": "2025-04-01T12:36:25.000000Z"}, {"uuid": "f1367ece-1bbc-4aeb-ad8e-bfac4d125ada", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lhbqxeycuq2g", "content": "", "creation_timestamp": "2025-02-03T14:30:16.765477Z"}, {"uuid": "19c846e2-2bfe-4f80-8294-8072ebba4341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgvivgj2r52m", "content": "", "creation_timestamp": "2025-01-29T17:33:56.939504Z"}, {"uuid": "234ddabe-85d3-461b-bfd2-46e4124199e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lgvqzltfak2o", "content": "", "creation_timestamp": "2025-01-29T19:59:31.484923Z"}, {"uuid": "3e715379-8468-4675-9c57-8b7708af68d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lgvr6otxvs2o", "content": "", "creation_timestamp": "2025-01-29T20:02:19.313590Z"}, {"uuid": "7c769ead-0e0d-4e21-9099-bb71ed31684f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgz3kjbihc2b", "content": "", "creation_timestamp": "2025-01-31T03:45:54.250084Z"}, {"uuid": "abf91457-8131-4124-892d-91b7f8f46945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgvyno7slf2e", "content": "", "creation_timestamp": "2025-01-29T22:15:56.549076Z"}, {"uuid": "fc1eb63a-dcfd-41f1-ab22-dbc65d3ee20e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://t.me/cvedetector/16727", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12705 - Bind DNS Server HTTP Flood CPU Exhaustion\", \n  \"Content\": \"CVE ID : CVE-2024-12705 \nPublished : Jan. 29, 2025, 10:15 p.m. | 2\u00a0hours, 11\u00a0minutes ago \nDescription : Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic.  \nThis issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T01:43:39.000000Z"}, {"uuid": "32887377-0819-4894-a833-4a788048cb8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://bsky.app/profile/isc.org/post/3lgvayr3plk2q", "content": "", "creation_timestamp": "2025-01-29T15:12:38.874719Z"}, {"uuid": "bc3eddc6-6f5e-4d86-8d13-b6be96b3c6b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lh2qnldlzw24", "content": "", "creation_timestamp": "2025-01-31T19:36:03.120260Z"}, {"uuid": "e77c6400-6751-4da9-a027-f53433af5c4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "ee4b4fca-6da7-491f-bc28-d807681a4b5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3430", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12705\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic.\nThis issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.\n\ud83d\udccf Published: 2025-01-30T00:31:03Z\n\ud83d\udccf Modified: 2025-01-30T00:31:03Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12705\n2. https://kb.isc.org/docs/cve-2024-12705", "creation_timestamp": "2025-01-30T01:12:11.000000Z"}, {"uuid": "2dff26c3-ad68-412d-8278-ae7c050942bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgyh4awrss25", "content": "", "creation_timestamp": "2025-01-30T21:39:58.500547Z"}, {"uuid": "8968cf73-86ed-41fe-8c9c-c618b24f0ef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12705", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgyh6dooh225", "content": "", "creation_timestamp": "2025-01-30T21:41:12.576504Z"}]}