Dns

70 CVEs product

Monthly

CVE-2026-28810 MEDIUM PATCH This Month

Erlang/OTP kernel inet_res DNS resolver uses predictable sequential transaction IDs and lacks source port randomization, enabling DNS cache poisoning attacks against systems relying on this resolver in untrusted network environments. Affects OTP 17.0 through 28.4.2 (and specific patch versions 27.3.4.10, 26.2.5.19); unauthenticated remote attackers who can observe or predict DNS query patterns can forge DNS responses to redirect traffic or execute man-in-the-middle attacks. Vendor-released patches available; no public exploit code or active exploitation confirmed.

Dns Cache Poisoning Otp
NVD GitHub VulDB
CVSS 4.0
6.3
EPSS
0.1%
CVE-2026-4194 HIGH This Week

Improper access controls in D-Link NAS devices (DNS-120, DNS-323, DNS-345, DNS-1200-05, and others through firmware version 20260205) allow unauthenticated remote attackers to manipulate the cgi_set_wto function in /cgi-bin/system_mgr.cgi, potentially gaining unauthorized access or modifying system settings. Public exploit code exists for this vulnerability, and no patch is currently available.

D-Link Dns Privilege Escalation Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-4203 MEDIUM POC This Month

Command injection in D-Link DNS and DNR network attached storage devices allows authenticated remote attackers to execute arbitrary commands through multiple CGI functions in the network management interface. The vulnerability affects numerous models up to firmware version 20260205, and public exploit code is available. An attacker with valid credentials can leverage this to compromise device integrity and potentially access the network.

Command Injection D-Link RCE Dhcp Dns +20
NVD VulDB GitHub
CVSS 3.1
6.3
EPSS
0.4%
CVE-2019-25465 HIGH POC This Week

Hisilicon HiIpcam V100R003 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by exploiting directory listing in the cgi-bin directory. [CVSS 7.5 HIGH]

Dns Path Traversal
NVD Exploit-DB VulDB
CVSS 3.1
7.5
EPSS
0.2%
CVE-2026-31828 HIGH PATCH This Week

Parse Server's LDAP authentication adapter fails to properly sanitize user input in Distinguished Names and group filters, allowing authenticated attackers to inject LDAP commands and bypass group-based access controls. This vulnerability enables privilege escalation for any valid LDAP user to gain membership in restricted groups, affecting deployments that rely on LDAP group policies for authorization. Patches are available in versions 9.5.2-alpha.13 and 8.6.26.

Node.js Dns Ldap Privilege Escalation Parse Server
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-26310 MEDIUM POC This Month

Envoy proxy versions prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13 crash when processing scoped IPv6 addresses through the Utility::getAddressWithPort function, which is invoked by the original_src and dns filters in the data plane. This denial of service vulnerability can be triggered remotely without authentication, and public exploit code exists. No patch is currently available for affected deployments.

Dns Denial Of Service Envoy
NVD GitHub VulDB
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-2741 PATCH Monitor

Specially crafted ZIP archives can escape the intended extraction directory during Node.js download and extraction in Vaadin 14.2.0 versions up to 14.14.0 is affected by path traversal.

Node.js Dns Path Traversal
NVD GitHub VulDB
EPSS
0.1%
CVE-2026-30858 MEDIUM POC PATCH This Month

DNS rebinding in WeKnora's web_fetch tool allows authenticated attackers to bypass URL validation and access internal resources and private IP addresses on the server through malicious domains that resolve differently during validation versus execution. Public exploit code exists for this vulnerability, and versions prior to 0.3.0 are affected with no patch currently available. An attacker could leverage this to access sensitive local services and exfiltrate data from the affected system.

Dns AI / ML Weknora
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-29781 MEDIUM POC This Month

Sliver C2 server versions 1.7.3 and earlier can be remotely crashed by authenticated attackers who craft malformed Protobuf messages that exploit missing nil-pointer validation in the unmarshalling logic. Public exploit code exists for this vulnerability, which causes a denial of service affecting all active implant sessions across the entire infrastructure, as the mTLS, WireGuard, and DNS transports lack panic recovery mechanisms. An attacker with captured implant credentials can instantly terminate the server process, requiring manual intervention to restore operations.

Dns Wireguard Sliver
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-24281 HIGH PATCH This Week

Hostname verification bypass in Apache ZooKeeper's ZKTrustManager allows attackers with a valid certificate trusted by the server to impersonate ZooKeeper nodes by exploiting fallback to reverse DNS validation when IP SAN checks fail. An attacker controlling or spoofing PTR records can intercept and forge communications between ZooKeeper servers and clients, compromising confidentiality and integrity of the cluster. No patch is currently available; mitigation requires upgrading to ZooKeeper 3.8.6 or 3.9.5 or disabling reverse DNS lookup via configuration.

Apache Dns Zookeeper Redhat
NVD VulDB
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-27138 MEDIUM PATCH This Month

DNS certificate verification can crash in systems handling X.509 certificate chains when processing certificates with empty DNS names paired with excluded name constraints, affecting applications performing direct certificate validation or using TLS. This denial of service condition requires no authentication or user interaction but depends on specific certificate chain configurations. No patch is currently available for this vulnerability.

Dns Denial Of Service Redhat Suse
NVD VulDB
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-26018 HIGH POC PATCH This Week

Coredns versions up to 1.14.2 contains a vulnerability that allows attackers to crash the DNS server by sending specially crafted DNS queries (CVSS 7.5).

Dns Denial Of Service Coredns Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-26017 HIGH PATCH This Week

CoreDNS versions prior to 1.14.2 allow authenticated attackers to bypass DNS access controls through a Time-of-Check Time-of-Use race condition in the plugin execution chain, where the rewrite plugin processes requests after security plugins like ACL have already validated them. An attacker with network access can exploit this logical flaw to access DNS records that should be restricted by configured access control policies. No patch is currently available for affected deployments.

Dns Race Condition Coredns Redhat Suse
NVD GitHub
CVSS 3.1
7.7
EPSS
0.1%
CVE-2026-28395 MEDIUM PATCH This Month

OpenClaw Chrome extension relay server versions prior to 2026.2.12 improperly bind to all network interfaces when wildcard cdpUrl values are configured, enabling remote attackers to discover service endpoints and port information. An attacker can exploit this exposure to conduct denial-of-service attacks and brute-force attempts against the relay token authentication mechanism without requiring local access.

Dns Openclaw Chrome
NVD GitHub
CVSS 3.1
6.5
EPSS
0.2%
CVE-2026-1678 CRITICAL POC Act Now

Buffer overflow in Zephyr RTOS dns_unpack_name() function causing OOB writes. PoC available.

Dns Zephyr
NVD GitHub
CVSS 3.1
9.4
EPSS
0.1%
CVE-2026-29125 MEDIUM POC This Month

Sfx2100 Firmware versions up to - is affected by incorrect permission assignment for critical resource (CVSS 4.7).

Dns Denial Of Service Sfx2100 Firmware
NVD
CVSS 3.1
4.7
EPSS
0.0%
CVE-2026-20067 MEDIUM This Month

Unauthenticated remote attackers can crash the Snort 3 Detection Engine by sending crafted HTTP packets with malformed Multicast DNS fields, causing a denial of service that interrupts packet inspection across multiple Cisco products. The vulnerability stems from incomplete error checking in HTTP header parsing and requires no authentication or user interaction to trigger. No patch is currently available for this MEDIUM severity issue.

Cisco Dns Denial Of Service
NVD
CVSS 3.1
5.8
EPSS
0.1%
CVE-2026-3379 HIGH POC This Week

Remote code execution in Tenda F453 1.0.0.3 DNS firmware via a buffer overflow in the /goform/SetIpBind endpoint allows authenticated attackers to achieve full system compromise. The vulnerability stems from improper input validation of the page parameter and has public exploit code available. An attacker with network access and valid credentials can execute arbitrary code with complete system privileges.

Dns Buffer Overflow F453 Firmware
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-28271 MEDIUM This Month

Kiteworks versions prior to 9.2.0 contain a DNS rebinding vulnerability that allows authenticated administrators to circumvent SSRF protections and access restricted internal services. An attacker with administrative privileges could exploit this misconfiguration to reach backend systems that should be isolated from external access. No patch is currently available for affected deployments.

Dns SSRF Kiteworks
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27831 HIGH This Week

Heap buffer over-read vulnerability in rldns DNS server version 1.3 allows remote attackers to trigger denial of service without authentication or user interaction. The flaw enables reading beyond allocated memory boundaries, causing the service to crash. Version 1.4 addresses this issue, though no patch is currently available for affected 1.3 deployments.

Dns Heap Overflow Denial Of Service
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27730 HIGH POC PATCH This Week

esm.sh versions up to 137 contain an SSRF vulnerability in the `/http(s)` fetch route that allows remote attackers to bypass hostname validation through DNS alias domains and access internal localhost services. Public exploit code exists for this vulnerability, and no patches are currently available. This affects users of esm.sh CDN services and any applications relying on the affected versions.

Dns SSRF Esm.Sh Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-27127 MEDIUM POC PATCH This Month

DNS rebinding attacks in Craft CMS 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22 allow authenticated attackers to bypass SSRF protections in GraphQL asset mutations by exploiting a Time-of-Check-Time-of-Use race condition between DNS validation and HTTP requests. Attackers with appropriate GraphQL schema permissions can access blocked IP addresses and internal resources that should be restricted. Public exploit code exists for this vulnerability, which represents a bypass of the previous CVE-2025-68437 fix.

Dns SSRF Race Condition Craft Cms
NVD GitHub
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-2966 LOW POC Monitor

A weakness has been identified in Cesanta Mongoose up to 7.20. The impacted element is the function mg_sendnsreq of the file /src/dns.c of the component DNS Transaction ID Handler. [CVSS 3.7 LOW]

Dns
NVD GitHub VulDB
CVSS 3.1
3.7
EPSS
0.1%
CVE-2026-2871 HIGH POC This Week

Remote code execution in Tenda A21 1.0.0.0 firmware results from a stack buffer overflow in the SetIpMacBind function accessible via the /goform/SetIpMacBind endpoint, allowing unauthenticated remote attackers to execute arbitrary code with high integrity and availability impact. Public exploit code exists for this vulnerability, and no patch is currently available, creating significant risk for affected devices.

Dns Buffer Overflow Stack Overflow A21 Firmware
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-27482 MEDIUM POC PATCH This Month

Ray dashboard versions 2.53.0 and below lack proper authentication on DELETE endpoints, allowing unauthenticated attackers to terminate Serve instances or remove jobs through DNS rebinding or same-network attacks. Public exploit code exists for this vulnerability, which impacts Ray deployments with dashboards exposed to network access. Administrators should upgrade to Ray 2.54.0 or higher to remediate the availability risk.

Dns AI / ML Ray
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-27002 CRITICAL PATCH Act Now

Configuration injection in OpenClaw Docker sandbox before 2026.2.15 allows escaping sandbox restrictions. Patch available.

Dotnet Docker Dns AI / ML Openclaw
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-26952 MEDIUM PATCH This Month

Pi-hole Admin Interface versions 6.4 and below allow authenticated administrators to inject stored HTML code through improperly sanitized DNS record inputs, enabling persistent attacks visible to any user viewing the DNS records table. The vulnerability exists in the populateDataTable() function which fails to escape special characters in user-supplied data before inserting it into HTML attributes. An attacker with admin privileges can inject malicious code that executes each time the DNS records page is accessed.

Dns Web Interface
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-23613 MEDIUM This Month

GFI MailEssentials AI prior to version 22.4 allows authenticated users to inject malicious scripts into the URI DNS Blocklist configuration page, which are stored and executed when administrators access the management interface. An attacker with valid credentials can exploit the unsanitized ctl00$ContentPlaceHolder1$pv1$TXB_URIs parameter to perform actions in the context of logged-in users, such as stealing session tokens or modifying security settings. No patch is currently available for this stored cross-site scripting vulnerability.

Dns XSS Mailessentials
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-23612 MEDIUM This Month

Stored cross-site scripting in GFI MailEssentials AI versions before 22.4 allows authenticated users to inject malicious scripts into the IP DNS Blocklist configuration page that execute when administrators access the management interface. An attacker with valid credentials can inject HTML/JavaScript through the IP configuration parameter to compromise other authenticated users' sessions. No patch is currently available for this vulnerability.

Dns XSS Mailessentials
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2019-25362 CRITICAL POC Act Now

Buffer overflow in WMV to AVI MPEG DVD Convertor 4.6.1217 allows code execution via crafted media files. PoC available.

Dns Buffer Overflow Stack Overflow Wmv To Avi Mpeg Dvd Wmv Convertor
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2019-25361 CRITICAL POC Act Now

Buffer overflow in Ayukov NFTP client 1.71 in SYST command handling allows remote FTP servers to execute arbitrary code on connecting clients. PoC available.

Dns Buffer Overflow
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.2%
CVE-2026-1490 CRITICAL Act Now

CleanTalk Anti-Spam WordPress plugin has an authorization bypass enabling unauthenticated attackers to perform file operations on the WordPress server.

WordPress Dns RCE
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-23203 Monitor

In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations.

Linux Dns Linux Kernel
NVD
EPSS
0.0%
CVE-2019-25327 CRITICAL POC Act Now

Buffer overflow in Prime95 29.8 build 6 user ID field allows code execution. PoC available.

Dns Buffer Overflow
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.2%
CVE-2019-25319 CRITICAL POC Act Now

Stack overflow in Domain Quester Pro 6.02 via SEH overwrite. PoC available.

Dns Stack Overflow
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.2%
CVE-2019-25318 HIGH POC This Week

AVS Audio Converter 9.1.2.600 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by manipulating the output folder text input. [CVSS 8.8 HIGH]

Dns Stack Overflow
NVD Exploit-DB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-0229 Monitor

A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet.

Paloalto Dns
NVD
EPSS
0.0%
CVE-2026-23906 CRITICAL PATCH Act Now

Authentication bypass in Apache Druid versions 0.17.0 through 35.x. Affects all versions prior to 36.0.0 when specific prerequisites are met.

Apache Dns Ldap Authentication Bypass Druid
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25791 HIGH POC PATCH This Week

Memory exhaustion in Sliver C2 framework prior to version 1.7.0 allows unauthenticated remote attackers to bypass OTP validation in the DNS listener and create unbounded server-side sessions without expiry mechanisms. Public exploit code exists for this vulnerability, enabling attackers to repeatedly allocate sessions and exhaust server memory resources. The DNS C2 listener accepts bootstrap messages without proper authentication even when OTP enforcement is enabled.

Dns Wireguard Sliver Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25740 This Week

captive browser, a dedicated Chrome instance to log into captive portals without messing with DNS settings.

Dns Chrome
NVD GitHub
EPSS
0.0%
CVE-2026-2186 HIGH POC This Week

Stack-based buffer overflow in Tenda RX3 firmware 16.03.13.11 allows authenticated remote attackers to achieve full system compromise through improper argument handling in the SetIpMacBind function. Public exploit code exists for this vulnerability, and no patch is currently available. Affected organizations should implement network segmentation and access controls to restrict administrative functionality until remediation is possible.

Dns Buffer Overflow Stack Overflow Rx3 Firmware
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2020-37095 CRITICAL POC Act Now

Cyberoam Authentication Client 2.1.2.7 has a buffer overflow allowing remote attackers to execute code through the network authentication service.

Dns Buffer Overflow
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.2%
CVE-2026-25758 HIGH POC PATCH This Week

Spree Commerce's guest checkout feature contains an insecure direct object reference (IDOR) flaw that allows unauthenticated attackers to access other customers' personally identifiable information by manipulating address parameters during transaction processing. Public exploit code exists for this vulnerability, which affects all guest checkout flows across multiple Spree versions. Patches are available for versions 4.10.3, 5.0.8, 5.1.10, 5.2.7, and 5.3.2.

Ruby Dns Spree
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2020-37119 CRITICAL POC Act Now

Stack-based buffer overflow in Nsauditor Network Auditing Tool 3.0.28 and 3.2.1.0 in the DNS Lookup tool allows attackers to execute arbitrary code via crafted input. PoC available.

Dns Buffer Overflow Nsauditor
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-1966 Monitor

YugabyteDB Anywhere displays LDAP bind passwords configured via gflags in cleartext within the web UI. An authenticated user with access to the configuration view could obtain LDAP credentials, potentially enabling unauthorized access to external directory services.

Dns Ldap
NVD
EPSS
0.0%
CVE-2025-11730 HIGH This Week

A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI command in Zyxel ATP series firmware versions from V5.35 through V5.41, USG FLEX series firmware versions from V5.35 through V5.41, USG FLEX 50(W) series firmware versions from V5.35 through V5.41, and USG20(W)-VPN series firmware versions from V5.35 through V5.41 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device by supplying a specially crafted string as an argument to the CLI command. [CVSS 7.2 HIGH]

Zyxel Dns Command Injection
NVD
CVSS 3.1
7.2
EPSS
0.3%
CVE-2026-25518 MEDIUM PATCH This Month

Denial-of-service in cert-manager versions 1.18.0-1.18.4 and 1.19.0-1.19.2 allows network-adjacent attackers to crash the controller by poisoning DNS cache entries during ACME DNS-01 validation through unencrypted DNS traffic interception. An attacker positioned to intercept DNS queries from the cert-manager pod can inject malicious DNS responses that trigger a panic in the controller, disrupting certificate management operations in affected Kubernetes clusters. A patch is available for immediate deployment.

Kubernetes Dns Cert Manager Redhat Suse
NVD GitHub VulDB
CVSS 3.1
5.9
EPSS
0.0%
CVE-2025-58383 HIGH This Week

Fabric Operating System versions up to 9.2.1 is affected by execution with unnecessary privileges (CVSS 7.2).

Dns Fabric Operating System
NVD
CVSS 3.1
7.2
EPSS
0.0%
CVE-2026-24054 CRITICAL POC PATCH Act Now

Sandbox escape in Kata Containers allowing guest VM to access host resources. CVSS 10.0 — undermines the core security guarantee of hardware-isolated containers. PoC and patch available.

Dns Kata Containers Redhat
NVD GitHub
CVSS 3.1
10.0
EPSS
0.1%
CVE-2025-71163 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix device leaks on compat bind and unbind Make sure to drop the reference taken when looking up the idxd device as part of the compat bind and unbind sysfs interface. [CVSS 5.5 MEDIUM]

Linux Dns Linux Kernel Redhat Suse
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-24055 MEDIUM POC PATCH This Month

Langfuse versions 3.146.0 and below allow unauthenticated attackers to hijack Slack OAuth integrations by injecting arbitrary projectIds into the /api/public/slack/install endpoint, enabling them to bind malicious Slack workspaces to any project and intercept prompt management data. An attacker can replace existing Prompt Slack Automations or pre-register malicious integrations that execute when authenticated users unknowingly configure them. Public exploit code exists for this vulnerability, which affects the DNS and AI/ML components of the Langfuse platform.

Dns AI / ML Langfuse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-13878 HIGH PATCH This Week

to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 versions up to 9.18.43 is affected by reachable assertion (CVSS 7.5).

Dns Redhat Suse
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-15104 MEDIUM POC This Month

Nu Html Checker (validator.nu) contains a restriction bypass that allows remote attackers to make the server perform arbitrary HTTP/HTTPS requests to internal resources, including localhost services. [CVSS 5.3 MEDIUM]

Dns Validator
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2021-47785 CRITICAL POC Act Now

Ether MP3 CD Burner 1.3.8 has buffer overflow in registration enabling bind shell on port 3110 via SEH overwrite. PoC available.

Dns RCE Buffer Overflow Ether Mp3 Cd Burner
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-0915 HIGH PATCH This Week

Stack memory disclosure in GNU C Library versions 2.0-2.42 allows unauthenticated remote attackers to leak sensitive stack contents via crafted DNS queries when getnetbyaddr functions are configured to use the DNS backend for network lookups. This vulnerability affects systems running vulnerable Glibc and DNS resolver combinations, with no available patch currently released.

Dns Glibc Redhat Suse
NVD VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-21920 HIGH This Week

Denial-of-service attacks against Juniper SRX Series devices running Junos OS 23.4 through 24.4 can be triggered remotely by sending a maliciously crafted DNS request, causing the flowd process to crash and interrupt service until recovery completes. The vulnerability stems from an unchecked return value in the DNS module that allows unauthenticated, network-based attackers to exploit DNS-enabled SRX configurations without any user interaction. No patch is currently available for affected versions.

Juniper Dns Denial Of Service Junos
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2021-47799 MEDIUM POC This Month

its Sudo configuration contains a vulnerability that allows attackers to gain root access (CVSS 6.2).

Dns Privilege Escalation
NVD Exploit-DB
CVSS 3.1
6.2
EPSS
0.0%
CVE-2021-47775 HIGH POC This Week

YouTube Video Grabber, now referred to as YouTube Downloader, 1.9.9.1 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting the Structured Exception Handler. [CVSS 8.4 HIGH]

Dns Buffer Overflow
NVD Exploit-DB
CVSS 3.1
8.4
EPSS
0.0%
CVE-2021-47774 CRITICAL POC Act Now

Kingdia CD Extractor 3.0.2 has a buffer overflow in the registration name field. PoC available.

Dns RCE Buffer Overflow
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-68802 Monitor

In the Linux kernel, the following vulnerability has been resolved: drm/xe: Limit num_syncs to prevent oversized allocations The exec and vm_bind ioctl allow userspace to specify an arbitrary num_syncs value.

Linux Dns Linux Kernel
NVD VulDB
EPSS
0.0%
CVE-2025-14279 HIGH PATCH This Week

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. [CVSS 8.1 HIGH]

Dns AI / ML Mlflow
NVD GitHub
CVSS 3.0
8.1
EPSS
0.0%
CVE-2025-50334 HIGH POC PATCH This Week

An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component [CVSS 7.5 HIGH]

Dns Denial Of Service Dnsserver Redhat
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-68151 HIGH PATCH This Week

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.0, multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, streams, or sending oversized request bodies. The issue is similar in nature to CVE-2025-47950 (QUIC DoS) but affects additional server types that do not enforce connection limits, stream limit...

Dns Denial Of Service Coredns Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-61939 HIGH This Week

An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. [CVSS 8.8 HIGH]

Ssh Dns Weather Microserver Firmware
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-9611 PATCH Monitor

Microsoft Playwright MCP Server versions up to 0.0.40 contains a vulnerability that allows attackers to perform a DNS rebinding attack via a victim’s web browser and send unauthorized.

Microsoft Dns
NVD GitHub
EPSS
0.2%
CVE-2026-0625 This Week

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality.

D-Link Dns Authentication Bypass
NVD
EPSS
0.7%
CVE-2025-24294 HIGH PATCH This Week

CVE-2025-24294 is a Denial of Service vulnerability in DNS packet parsing libraries (specifically the resolv library) caused by insufficient validation of decompressed domain name lengths. An attacker can send a crafted DNS packet with a highly compressed domain name that, when decompressed, consumes excessive CPU resources without limit, causing the parsing thread to become unresponsive. The vulnerability affects any application using the vulnerable resolv library and has a CVSS score of 7.5 (high severity); real-world exploitation probability and active exploitation status cannot be confirmed without EPSS score and KEV data.

Denial Of Service Dns Redhat Suse
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-6432 HIGH PATCH This Week

CVE-2025-6432 is a DNS proxy bypass vulnerability in Firefox and Thunderbird when Mozilla's Multi-Account Containers extension is enabled. Under specific conditions-invalid domain names or unresponsive SOCKS proxies-DNS requests circumvent the configured SOCKS proxy, potentially exposing user browsing activity to network monitoring. This affects Firefox < 140 and Thunderbird < 140, has a high CVSS score of 8.6 reflecting significant confidentiality impact, and requires network-level access but no user interaction to exploit.

Information Disclosure Mozilla Dns Firefox Thunderbird +2
NVD
CVSS 3.1
8.6
EPSS
0.1%
CVE-2025-2962 HIGH POC This Week

CVE-2025-2962 is a denial-of-service vulnerability in a DNS implementation that triggers an infinite loop condition, allowing unauthenticated remote attackers to crash DNS services with high availability impact. The vulnerability affects DNS resolver implementations and has a CVSS score of 7.5 (High) with a network-based attack vector requiring no privileges or user interaction. While the CVE ID and basic metadata are provided, specific product names, versions, KEV status, EPSS scores, and public proof-of-concept availability cannot be confirmed from the limited data supplied.

Denial Of Service Dns Zephyr
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-5688 HIGH This Week

Buffer overflow vulnerability (CWE-787: Out-of-bounds Write) in DNS name processing affecting systems running LLMNR or mDNS with Buffer Allocation Scheme 1 enabled. An attacker with local access can trigger out-of-bounds writes by crafting LLMNR/mDNS queries with excessively long DNS names, potentially achieving code execution or system compromise. The vulnerability requires local access (AV:L) but no user interaction or authentication, making it a significant privilege escalation vector on multi-user systems.

Buffer Overflow Denial Of Service Dns
NVD GitHub
CVSS 4.0
7.5
EPSS
0.0%
CVE-2026-28810
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Erlang/OTP kernel inet_res DNS resolver uses predictable sequential transaction IDs and lacks source port randomization, enabling DNS cache poisoning attacks against systems relying on this resolver in untrusted network environments. Affects OTP 17.0 through 28.4.2 (and specific patch versions 27.3.4.10, 26.2.5.19); unauthenticated remote attackers who can observe or predict DNS query patterns can forge DNS responses to redirect traffic or execute man-in-the-middle attacks. Vendor-released patches available; no public exploit code or active exploitation confirmed.

Dns Cache Poisoning Otp
NVD GitHub VulDB
CVE-2026-4194
EPSS 0% CVSS 7.3
HIGH This Week

Improper access controls in D-Link NAS devices (DNS-120, DNS-323, DNS-345, DNS-1200-05, and others through firmware version 20260205) allow unauthenticated remote attackers to manipulate the cgi_set_wto function in /cgi-bin/system_mgr.cgi, potentially gaining unauthorized access or modifying system settings. Public exploit code exists for this vulnerability, and no patch is currently available.

D-Link Dns Privilege Escalation +1
NVD GitHub VulDB
CVE-2026-4203
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Command injection in D-Link DNS and DNR network attached storage devices allows authenticated remote attackers to execute arbitrary commands through multiple CGI functions in the network management interface. The vulnerability affects numerous models up to firmware version 20260205, and public exploit code is available. An attacker with valid credentials can leverage this to compromise device integrity and potentially access the network.

Command Injection D-Link RCE +22
NVD VulDB GitHub
CVE-2019-25465
EPSS 0% CVSS 7.5
HIGH POC This Week

Hisilicon HiIpcam V100R003 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by exploiting directory listing in the cgi-bin directory. [CVSS 7.5 HIGH]

Dns Path Traversal
NVD Exploit-DB VulDB
CVE-2026-31828
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Parse Server's LDAP authentication adapter fails to properly sanitize user input in Distinguished Names and group filters, allowing authenticated attackers to inject LDAP commands and bypass group-based access controls. This vulnerability enables privilege escalation for any valid LDAP user to gain membership in restricted groups, affecting deployments that rely on LDAP group policies for authorization. Patches are available in versions 9.5.2-alpha.13 and 8.6.26.

Node.js Dns Ldap +2
NVD GitHub VulDB
CVE-2026-26310
EPSS 0% CVSS 5.9
MEDIUM POC This Month

Envoy proxy versions prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13 crash when processing scoped IPv6 addresses through the Utility::getAddressWithPort function, which is invoked by the original_src and dns filters in the data plane. This denial of service vulnerability can be triggered remotely without authentication, and public exploit code exists. No patch is currently available for affected deployments.

Dns Denial Of Service Envoy
NVD GitHub VulDB
CVE-2026-2741
EPSS 0%
PATCH Monitor

Specially crafted ZIP archives can escape the intended extraction directory during Node.js download and extraction in Vaadin 14.2.0 versions up to 14.14.0 is affected by path traversal.

Node.js Dns Path Traversal
NVD GitHub VulDB
CVE-2026-30858
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

DNS rebinding in WeKnora's web_fetch tool allows authenticated attackers to bypass URL validation and access internal resources and private IP addresses on the server through malicious domains that resolve differently during validation versus execution. Public exploit code exists for this vulnerability, and versions prior to 0.3.0 are affected with no patch currently available. An attacker could leverage this to access sensitive local services and exfiltrate data from the affected system.

Dns AI / ML Weknora
NVD GitHub
CVE-2026-29781
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Sliver C2 server versions 1.7.3 and earlier can be remotely crashed by authenticated attackers who craft malformed Protobuf messages that exploit missing nil-pointer validation in the unmarshalling logic. Public exploit code exists for this vulnerability, which causes a denial of service affecting all active implant sessions across the entire infrastructure, as the mTLS, WireGuard, and DNS transports lack panic recovery mechanisms. An attacker with captured implant credentials can instantly terminate the server process, requiring manual intervention to restore operations.

Dns Wireguard Sliver
NVD GitHub
CVE-2026-24281
EPSS 0% CVSS 7.4
HIGH PATCH This Week

Hostname verification bypass in Apache ZooKeeper's ZKTrustManager allows attackers with a valid certificate trusted by the server to impersonate ZooKeeper nodes by exploiting fallback to reverse DNS validation when IP SAN checks fail. An attacker controlling or spoofing PTR records can intercept and forge communications between ZooKeeper servers and clients, compromising confidentiality and integrity of the cluster. No patch is currently available; mitigation requires upgrading to ZooKeeper 3.8.6 or 3.9.5 or disabling reverse DNS lookup via configuration.

Apache Dns Zookeeper +1
NVD VulDB
CVE-2026-27138
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

DNS certificate verification can crash in systems handling X.509 certificate chains when processing certificates with empty DNS names paired with excluded name constraints, affecting applications performing direct certificate validation or using TLS. This denial of service condition requires no authentication or user interaction but depends on specific certificate chain configurations. No patch is currently available for this vulnerability.

Dns Denial Of Service Redhat +1
NVD VulDB
CVE-2026-26018
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Coredns versions up to 1.14.2 contains a vulnerability that allows attackers to crash the DNS server by sending specially crafted DNS queries (CVSS 7.5).

Dns Denial Of Service Coredns +2
NVD GitHub
CVE-2026-26017
EPSS 0% CVSS 7.7
HIGH PATCH This Week

CoreDNS versions prior to 1.14.2 allow authenticated attackers to bypass DNS access controls through a Time-of-Check Time-of-Use race condition in the plugin execution chain, where the rewrite plugin processes requests after security plugins like ACL have already validated them. An attacker with network access can exploit this logical flaw to access DNS records that should be restricted by configured access control policies. No patch is currently available for affected deployments.

Dns Race Condition Coredns +2
NVD GitHub
CVE-2026-28395
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OpenClaw Chrome extension relay server versions prior to 2026.2.12 improperly bind to all network interfaces when wildcard cdpUrl values are configured, enabling remote attackers to discover service endpoints and port information. An attacker can exploit this exposure to conduct denial-of-service attacks and brute-force attempts against the relay token authentication mechanism without requiring local access.

Dns Openclaw Chrome
NVD GitHub
CVE-2026-1678
EPSS 0% CVSS 9.4
CRITICAL POC Act Now

Buffer overflow in Zephyr RTOS dns_unpack_name() function causing OOB writes. PoC available.

Dns Zephyr
NVD GitHub
CVE-2026-29125
EPSS 0% CVSS 4.7
MEDIUM POC This Month

Sfx2100 Firmware versions up to - is affected by incorrect permission assignment for critical resource (CVSS 4.7).

Dns Denial Of Service Sfx2100 Firmware
NVD
CVE-2026-20067
EPSS 0% CVSS 5.8
MEDIUM This Month

Unauthenticated remote attackers can crash the Snort 3 Detection Engine by sending crafted HTTP packets with malformed Multicast DNS fields, causing a denial of service that interrupts packet inspection across multiple Cisco products. The vulnerability stems from incomplete error checking in HTTP header parsing and requires no authentication or user interaction to trigger. No patch is currently available for this MEDIUM severity issue.

Cisco Dns Denial Of Service
NVD
CVE-2026-3379
EPSS 0% CVSS 8.8
HIGH POC This Week

Remote code execution in Tenda F453 1.0.0.3 DNS firmware via a buffer overflow in the /goform/SetIpBind endpoint allows authenticated attackers to achieve full system compromise. The vulnerability stems from improper input validation of the page parameter and has public exploit code available. An attacker with network access and valid credentials can execute arbitrary code with complete system privileges.

Dns Buffer Overflow F453 Firmware
NVD GitHub VulDB
CVE-2026-28271
EPSS 0% CVSS 6.5
MEDIUM This Month

Kiteworks versions prior to 9.2.0 contain a DNS rebinding vulnerability that allows authenticated administrators to circumvent SSRF protections and access restricted internal services. An attacker with administrative privileges could exploit this misconfiguration to reach backend systems that should be isolated from external access. No patch is currently available for affected deployments.

Dns SSRF Kiteworks
NVD GitHub
CVE-2026-27831
EPSS 0% CVSS 7.5
HIGH This Week

Heap buffer over-read vulnerability in rldns DNS server version 1.3 allows remote attackers to trigger denial of service without authentication or user interaction. The flaw enables reading beyond allocated memory boundaries, causing the service to crash. Version 1.4 addresses this issue, though no patch is currently available for affected 1.3 deployments.

Dns Heap Overflow Denial Of Service
NVD GitHub
CVE-2026-27730
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

esm.sh versions up to 137 contain an SSRF vulnerability in the `/http(s)` fetch route that allows remote attackers to bypass hostname validation through DNS alias domains and access internal localhost services. Public exploit code exists for this vulnerability, and no patches are currently available. This affects users of esm.sh CDN services and any applications relying on the affected versions.

Dns SSRF Esm.Sh +1
NVD GitHub
CVE-2026-27127
EPSS 0% CVSS 6.3
MEDIUM POC PATCH This Month

DNS rebinding attacks in Craft CMS 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22 allow authenticated attackers to bypass SSRF protections in GraphQL asset mutations by exploiting a Time-of-Check-Time-of-Use race condition between DNS validation and HTTP requests. Attackers with appropriate GraphQL schema permissions can access blocked IP addresses and internal resources that should be restricted. Public exploit code exists for this vulnerability, which represents a bypass of the previous CVE-2025-68437 fix.

Dns SSRF Race Condition +1
NVD GitHub
CVE-2026-2966
EPSS 0% CVSS 3.7
LOW POC Monitor

A weakness has been identified in Cesanta Mongoose up to 7.20. The impacted element is the function mg_sendnsreq of the file /src/dns.c of the component DNS Transaction ID Handler. [CVSS 3.7 LOW]

Dns
NVD GitHub VulDB
CVE-2026-2871
EPSS 0% CVSS 8.8
HIGH POC This Week

Remote code execution in Tenda A21 1.0.0.0 firmware results from a stack buffer overflow in the SetIpMacBind function accessible via the /goform/SetIpMacBind endpoint, allowing unauthenticated remote attackers to execute arbitrary code with high integrity and availability impact. Public exploit code exists for this vulnerability, and no patch is currently available, creating significant risk for affected devices.

Dns Buffer Overflow Stack Overflow +1
NVD GitHub VulDB
CVE-2026-27482
EPSS 0% CVSS 5.9
MEDIUM POC PATCH This Month

Ray dashboard versions 2.53.0 and below lack proper authentication on DELETE endpoints, allowing unauthenticated attackers to terminate Serve instances or remove jobs through DNS rebinding or same-network attacks. Public exploit code exists for this vulnerability, which impacts Ray deployments with dashboards exposed to network access. Administrators should upgrade to Ray 2.54.0 or higher to remediate the availability risk.

Dns AI / ML Ray
NVD GitHub
CVE-2026-27002
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Configuration injection in OpenClaw Docker sandbox before 2026.2.15 allows escaping sandbox restrictions. Patch available.

Dotnet Docker Dns +2
NVD GitHub
CVE-2026-26952
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Pi-hole Admin Interface versions 6.4 and below allow authenticated administrators to inject stored HTML code through improperly sanitized DNS record inputs, enabling persistent attacks visible to any user viewing the DNS records table. The vulnerability exists in the populateDataTable() function which fails to escape special characters in user-supplied data before inserting it into HTML attributes. An attacker with admin privileges can inject malicious code that executes each time the DNS records page is accessed.

Dns Web Interface
NVD GitHub
CVE-2026-23613
EPSS 0% CVSS 5.4
MEDIUM This Month

GFI MailEssentials AI prior to version 22.4 allows authenticated users to inject malicious scripts into the URI DNS Blocklist configuration page, which are stored and executed when administrators access the management interface. An attacker with valid credentials can exploit the unsanitized ctl00$ContentPlaceHolder1$pv1$TXB_URIs parameter to perform actions in the context of logged-in users, such as stealing session tokens or modifying security settings. No patch is currently available for this stored cross-site scripting vulnerability.

Dns XSS Mailessentials
NVD
CVE-2026-23612
EPSS 0% CVSS 5.4
MEDIUM This Month

Stored cross-site scripting in GFI MailEssentials AI versions before 22.4 allows authenticated users to inject malicious scripts into the IP DNS Blocklist configuration page that execute when administrators access the management interface. An attacker with valid credentials can inject HTML/JavaScript through the IP configuration parameter to compromise other authenticated users' sessions. No patch is currently available for this vulnerability.

Dns XSS Mailessentials
NVD
CVE-2019-25362
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Buffer overflow in WMV to AVI MPEG DVD Convertor 4.6.1217 allows code execution via crafted media files. PoC available.

Dns Buffer Overflow Stack Overflow +1
NVD Exploit-DB
CVE-2019-25361
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Buffer overflow in Ayukov NFTP client 1.71 in SYST command handling allows remote FTP servers to execute arbitrary code on connecting clients. PoC available.

Dns Buffer Overflow
NVD Exploit-DB
CVE-2026-1490
EPSS 0% CVSS 9.8
CRITICAL Act Now

CleanTalk Anti-Spam WordPress plugin has an authorization bypass enabling unauthenticated attackers to perform file operations on the WordPress server.

WordPress Dns RCE
NVD
CVE-2026-23203
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations.

Linux Dns Linux Kernel
NVD
CVE-2019-25327
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Buffer overflow in Prime95 29.8 build 6 user ID field allows code execution. PoC available.

Dns Buffer Overflow
NVD Exploit-DB
CVE-2019-25319
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Stack overflow in Domain Quester Pro 6.02 via SEH overwrite. PoC available.

Dns Stack Overflow
NVD Exploit-DB
CVE-2019-25318
EPSS 0% CVSS 8.8
HIGH POC This Week

AVS Audio Converter 9.1.2.600 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by manipulating the output folder text input. [CVSS 8.8 HIGH]

Dns Stack Overflow
NVD Exploit-DB
CVE-2026-0229
EPSS 0%
Monitor

A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet.

Paloalto Dns
NVD
CVE-2026-23906
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Authentication bypass in Apache Druid versions 0.17.0 through 35.x. Affects all versions prior to 36.0.0 when specific prerequisites are met.

Apache Dns Ldap +2
NVD
CVE-2026-25791
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Memory exhaustion in Sliver C2 framework prior to version 1.7.0 allows unauthenticated remote attackers to bypass OTP validation in the DNS listener and create unbounded server-side sessions without expiry mechanisms. Public exploit code exists for this vulnerability, enabling attackers to repeatedly allocate sessions and exhaust server memory resources. The DNS C2 listener accepts bootstrap messages without proper authentication even when OTP enforcement is enabled.

Dns Wireguard Sliver +1
NVD GitHub
CVE-2026-25740
EPSS 0%
This Week

captive browser, a dedicated Chrome instance to log into captive portals without messing with DNS settings.

Dns Chrome
NVD GitHub
CVE-2026-2186
EPSS 0% CVSS 8.8
HIGH POC This Week

Stack-based buffer overflow in Tenda RX3 firmware 16.03.13.11 allows authenticated remote attackers to achieve full system compromise through improper argument handling in the SetIpMacBind function. Public exploit code exists for this vulnerability, and no patch is currently available. Affected organizations should implement network segmentation and access controls to restrict administrative functionality until remediation is possible.

Dns Buffer Overflow Stack Overflow +1
NVD GitHub VulDB
CVE-2020-37095
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Cyberoam Authentication Client 2.1.2.7 has a buffer overflow allowing remote attackers to execute code through the network authentication service.

Dns Buffer Overflow
NVD Exploit-DB
CVE-2026-25758
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Spree Commerce's guest checkout feature contains an insecure direct object reference (IDOR) flaw that allows unauthenticated attackers to access other customers' personally identifiable information by manipulating address parameters during transaction processing. Public exploit code exists for this vulnerability, which affects all guest checkout flows across multiple Spree versions. Patches are available for versions 4.10.3, 5.0.8, 5.1.10, 5.2.7, and 5.3.2.

Ruby Dns Spree
NVD GitHub
CVE-2020-37119
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Stack-based buffer overflow in Nsauditor Network Auditing Tool 3.0.28 and 3.2.1.0 in the DNS Lookup tool allows attackers to execute arbitrary code via crafted input. PoC available.

Dns Buffer Overflow Nsauditor
NVD Exploit-DB
CVE-2026-1966
EPSS 0%
Monitor

YugabyteDB Anywhere displays LDAP bind passwords configured via gflags in cleartext within the web UI. An authenticated user with access to the configuration view could obtain LDAP credentials, potentially enabling unauthorized access to external directory services.

Dns Ldap
NVD
CVE-2025-11730
EPSS 0% CVSS 7.2
HIGH This Week

A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI command in Zyxel ATP series firmware versions from V5.35 through V5.41, USG FLEX series firmware versions from V5.35 through V5.41, USG FLEX 50(W) series firmware versions from V5.35 through V5.41, and USG20(W)-VPN series firmware versions from V5.35 through V5.41 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device by supplying a specially crafted string as an argument to the CLI command. [CVSS 7.2 HIGH]

Zyxel Dns Command Injection
NVD
CVE-2026-25518
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

Denial-of-service in cert-manager versions 1.18.0-1.18.4 and 1.19.0-1.19.2 allows network-adjacent attackers to crash the controller by poisoning DNS cache entries during ACME DNS-01 validation through unencrypted DNS traffic interception. An attacker positioned to intercept DNS queries from the cert-manager pod can inject malicious DNS responses that trigger a panic in the controller, disrupting certificate management operations in affected Kubernetes clusters. A patch is available for immediate deployment.

Kubernetes Dns Cert Manager +2
NVD GitHub VulDB
CVE-2025-58383
EPSS 0% CVSS 7.2
HIGH This Week

Fabric Operating System versions up to 9.2.1 is affected by execution with unnecessary privileges (CVSS 7.2).

Dns Fabric Operating System
NVD
CVE-2026-24054
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

Sandbox escape in Kata Containers allowing guest VM to access host resources. CVSS 10.0 — undermines the core security guarantee of hardware-isolated containers. PoC and patch available.

Dns Kata Containers Redhat
NVD GitHub
CVE-2025-71163
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix device leaks on compat bind and unbind Make sure to drop the reference taken when looking up the idxd device as part of the compat bind and unbind sysfs interface. [CVSS 5.5 MEDIUM]

Linux Dns Linux Kernel +2
NVD
CVE-2026-24055
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

Langfuse versions 3.146.0 and below allow unauthenticated attackers to hijack Slack OAuth integrations by injecting arbitrary projectIds into the /api/public/slack/install endpoint, enabling them to bind malicious Slack workspaces to any project and intercept prompt management data. An attacker can replace existing Prompt Slack Automations or pre-register malicious integrations that execute when authenticated users unknowingly configure them. Public exploit code exists for this vulnerability, which affects the DNS and AI/ML components of the Langfuse platform.

Dns AI / ML Langfuse
NVD GitHub
CVE-2025-13878
EPSS 0% CVSS 7.5
HIGH PATCH This Week

to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 versions up to 9.18.43 is affected by reachable assertion (CVSS 7.5).

Dns Redhat Suse
NVD
CVE-2025-15104
EPSS 0% CVSS 5.3
MEDIUM POC This Month

Nu Html Checker (validator.nu) contains a restriction bypass that allows remote attackers to make the server perform arbitrary HTTP/HTTPS requests to internal resources, including localhost services. [CVSS 5.3 MEDIUM]

Dns Validator
NVD GitHub
CVE-2021-47785
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Ether MP3 CD Burner 1.3.8 has buffer overflow in registration enabling bind shell on port 3110 via SEH overwrite. PoC available.

Dns RCE Buffer Overflow +1
NVD Exploit-DB
CVE-2026-0915
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Stack memory disclosure in GNU C Library versions 2.0-2.42 allows unauthenticated remote attackers to leak sensitive stack contents via crafted DNS queries when getnetbyaddr functions are configured to use the DNS backend for network lookups. This vulnerability affects systems running vulnerable Glibc and DNS resolver combinations, with no available patch currently released.

Dns Glibc Redhat +1
NVD VulDB
CVE-2026-21920
EPSS 0% CVSS 7.5
HIGH This Week

Denial-of-service attacks against Juniper SRX Series devices running Junos OS 23.4 through 24.4 can be triggered remotely by sending a maliciously crafted DNS request, causing the flowd process to crash and interrupt service until recovery completes. The vulnerability stems from an unchecked return value in the DNS module that allows unauthenticated, network-based attackers to exploit DNS-enabled SRX configurations without any user interaction. No patch is currently available for affected versions.

Juniper Dns Denial Of Service +1
NVD
CVE-2021-47799
EPSS 0% CVSS 6.2
MEDIUM POC This Month

its Sudo configuration contains a vulnerability that allows attackers to gain root access (CVSS 6.2).

Dns Privilege Escalation
NVD Exploit-DB
CVE-2021-47775
EPSS 0% CVSS 8.4
HIGH POC This Week

YouTube Video Grabber, now referred to as YouTube Downloader, 1.9.9.1 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting the Structured Exception Handler. [CVSS 8.4 HIGH]

Dns Buffer Overflow
NVD Exploit-DB
CVE-2021-47774
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Kingdia CD Extractor 3.0.2 has a buffer overflow in the registration name field. PoC available.

Dns RCE Buffer Overflow
NVD Exploit-DB
CVE-2025-68802
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: drm/xe: Limit num_syncs to prevent oversized allocations The exec and vm_bind ioctl allow userspace to specify an arbitrary num_syncs value.

Linux Dns Linux Kernel
NVD VulDB
CVE-2025-14279
EPSS 0% CVSS 8.1
HIGH PATCH This Week

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. [CVSS 8.1 HIGH]

Dns AI / ML Mlflow
NVD GitHub
CVE-2025-50334
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component [CVSS 7.5 HIGH]

Dns Denial Of Service Dnsserver +1
NVD GitHub
CVE-2025-68151
EPSS 0% CVSS 7.5
HIGH PATCH This Week

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.0, multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, streams, or sending oversized request bodies. The issue is similar in nature to CVE-2025-47950 (QUIC DoS) but affects additional server types that do not enforce connection limits, stream limit...

Dns Denial Of Service Coredns +2
NVD GitHub
CVE-2025-61939
EPSS 0% CVSS 8.8
HIGH This Week

An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. [CVSS 8.8 HIGH]

Ssh Dns Weather Microserver Firmware
NVD GitHub
CVE-2025-9611
EPSS 0%
PATCH Monitor

Microsoft Playwright MCP Server versions up to 0.0.40 contains a vulnerability that allows attackers to perform a DNS rebinding attack via a victim’s web browser and send unauthorized.

Microsoft Dns
NVD GitHub
CVE-2026-0625
EPSS 1%
This Week

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality.

D-Link Dns Authentication Bypass
NVD
CVE-2025-24294
EPSS 0% CVSS 7.5
HIGH PATCH This Week

CVE-2025-24294 is a Denial of Service vulnerability in DNS packet parsing libraries (specifically the resolv library) caused by insufficient validation of decompressed domain name lengths. An attacker can send a crafted DNS packet with a highly compressed domain name that, when decompressed, consumes excessive CPU resources without limit, causing the parsing thread to become unresponsive. The vulnerability affects any application using the vulnerable resolv library and has a CVSS score of 7.5 (high severity); real-world exploitation probability and active exploitation status cannot be confirmed without EPSS score and KEV data.

Denial Of Service Dns Redhat +1
NVD
CVE-2025-6432
EPSS 0% CVSS 8.6
HIGH PATCH This Week

CVE-2025-6432 is a DNS proxy bypass vulnerability in Firefox and Thunderbird when Mozilla's Multi-Account Containers extension is enabled. Under specific conditions-invalid domain names or unresponsive SOCKS proxies-DNS requests circumvent the configured SOCKS proxy, potentially exposing user browsing activity to network monitoring. This affects Firefox < 140 and Thunderbird < 140, has a high CVSS score of 8.6 reflecting significant confidentiality impact, and requires network-level access but no user interaction to exploit.

Information Disclosure Mozilla Dns +4
NVD
CVE-2025-2962
EPSS 0% CVSS 7.5
HIGH POC This Week

CVE-2025-2962 is a denial-of-service vulnerability in a DNS implementation that triggers an infinite loop condition, allowing unauthenticated remote attackers to crash DNS services with high availability impact. The vulnerability affects DNS resolver implementations and has a CVSS score of 7.5 (High) with a network-based attack vector requiring no privileges or user interaction. While the CVE ID and basic metadata are provided, specific product names, versions, KEV status, EPSS scores, and public proof-of-concept availability cannot be confirmed from the limited data supplied.

Denial Of Service Dns Zephyr
NVD GitHub
CVE-2025-5688
EPSS 0% CVSS 7.5
HIGH This Week

Buffer overflow vulnerability (CWE-787: Out-of-bounds Write) in DNS name processing affecting systems running LLMNR or mDNS with Buffer Allocation Scheme 1 enabled. An attacker with local access can trigger out-of-bounds writes by crafting LLMNR/mDNS queries with excessively long DNS names, potentially achieving code execution or system compromise. The vulnerability requires local access (AV:L) but no user interaction or authentication, making it a significant privilege escalation vector on multi-user systems.

Buffer Overflow Denial Of Service Dns
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy