高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-33593 | 7.5 HIGH | Denial of service via crafted DNSCrypt query |
| CVE-2026-33608 | 7.4 HIGH | Incomplete domain name sanitization during |
| CVE-2026-33602 | 6.5 MEDIUM | Off-by-one access when processing crafted UDP responses |
| CVE-2026-33611 | 6.5 MEDIUM | Insufficient validation of HTTPS and SVCB records |
| CVE-2026-33261 | 5.9 MEDIUM | Null pointer accces in aggressive NSEC(3) cache |
| CVE-2026-33610 | 5.9 MEDIUM | Possible file descriptor exhaustion in forward-dnsupdate |
| CVE-2026-33260 | 5.3 MEDIUM | Insufficient input validation of internal webserver |
| CVE-2026-33609 | 5.3 MEDIUM | LDAP DN injection |
| CVE-2026-33254 | 5.3 MEDIUM | Resource exhaustion via DoQ/DoH3 connections |
| CVE-2026-33595 | 5.3 MEDIUM | DoQ/DoH3 excessive memory allocation |
| CVE-2026-33594 | 5.3 MEDIUM | Outgoing DoH excessive memory allocation |
| CVE-2026-33256 | 5.3 MEDIUM | Unbounded memory allocation by internal web server |
| CVE-2026-33257 | 5.3 MEDIUM | Insufficient input validation of internal webserver |
| CVE-2026-33258 | 5.3 MEDIUM | Crafted zones can cause increased resource usage |
| CVE-2026-33259 | 5.0 MEDIUM | Concurrent modification of RPZ data can lead to denial of servce |
| CVE-2026-33598 | 4.8 MEDIUM | Out-of-bounds read in cache inspection via Lua |
| CVE-2026-33601 | 4.4 MEDIUM | Insufficient validation of zonemd record |
| CVE-2026-33600 | 4.4 MEDIUM | Null pointer dereference in RPZ transfer |
| CVE-2026-33597 | 3.7 LOW | PRSD detection denial of service |
| CVE-2026-33596 | 3.1 LOW | TCP backend stream ID overflow |
Showing 20 of 22 CVEs. View all on vendor page →
まだコメントはありません