Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-33593 | 7.5 HIGH | Denial of service via crafted DNSCrypt query |
| CVE-2026-33608 | 7.4 HIGH | Incomplete domain name sanitization during |
| CVE-2026-33611 | 6.5 MEDIUM | Insufficient validation of HTTPS and SVCB records |
| CVE-2026-33261 | 5.9 MEDIUM | Null pointer accces in aggressive NSEC(3) cache |
| CVE-2026-33262 | 5.9 MEDIUM | Insufficient validation of cookie reply |
| CVE-2026-33610 | 5.9 MEDIUM | Possible file descriptor exhaustion in forward-dnsupdate |
| CVE-2026-33260 | 5.3 MEDIUM | Insufficient input validation of internal webserver |
| CVE-2026-33609 | 5.3 MEDIUM | LDAP DN injection |
| CVE-2026-33254 | 5.3 MEDIUM | Resource exhaustion via DoQ/DoH3 connections |
| CVE-2026-33595 | 5.3 MEDIUM | DoQ/DoH3 excessive memory allocation |
| CVE-2026-33594 | 5.3 MEDIUM | Outgoing DoH excessive memory allocation |
| CVE-2026-33256 | 5.3 MEDIUM | Unbounded memory allocation by internal web server |
| CVE-2026-33257 | 5.3 MEDIUM | Insufficient input validation of internal webserver |
| CVE-2026-33258 | 5.3 MEDIUM | Crafted zones can cause increased resource usage |
| CVE-2026-33259 | 5.0 MEDIUM | Concurrent modification of RPZ data can lead to denial of servce |
| CVE-2026-33598 | 4.8 MEDIUM | Out-of-bounds read in cache inspection via Lua |
| CVE-2026-33601 | 4.4 MEDIUM | Insufficient validation of zonemd record |
| CVE-2026-33600 | 4.4 MEDIUM | Null pointer dereference in RPZ transfer |
| CVE-2026-33597 | 3.7 LOW | PRSD detection denial of service |
| CVE-2026-33596 | 3.1 LOW | TCP backend stream ID overflow |
Showing top 20 of 22 CVEs. View all on vendor page → →
No comments yet