Total CVEs

125,743

Critical Severity

2,263

High Severity

7,843

Last 7 Days

1,178
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 1,421 - 1,440 of 22,148 CVEs
CVE-2026-6355 MEDIUM - 6.5

A vulnerability in the web application allows unauthorized users to access and manipulate sensitive data across different tenants by exploiting insecure direct object references. This could lead to unauthorized access to sensitive information and unauthorized changes to the tenant's configurati...

Published: Apr 22, 2026
Source: NVD

An insecure direct object reference (IDOR) vulnerability in the Fullstep V5 registration process allows authenticated users to access data belonging to other registered users through various vulnerable authenticated resources in the application. The vulnerable endpoints result from: '/api/suppl...

Published: Apr 22, 2026
Source: NVD

Inadequate access control in the registration process in Fullstep V5, which could allow unauthenticated users to obtain a valid JWT token with which to interact with authenticated API resources. Successful exploitation of this vulnerability could allow an unauthenticated attacker to compromise the c...

Published: Apr 22, 2026
Source: NVD
CVE-2026-41651 HIGH - 8.8

PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that all...

Vendor: PackageKit
Product: PackageKit
Published: Apr 22, 2026
Source: NVD
CVE-2026-33611 MEDIUM - 6.5

An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend.

Vendor: PowerDNS
Product: Authoritative
Published: Apr 22, 2026
Source: NVD
CVE-2026-33610 MEDIUM - 5.9

A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it.

Vendor: PowerDNS
Product: Authoritative
Published: Apr 22, 2026
Source: NVD
CVE-2026-33609 MEDIUM - 5.3

Incomplete escaping of LDAP queries when running with 8bit-dns enabled allows users to perform queries of internal domain subtrees.

Vendor: PowerDNS
Product: Authoritative
Published: Apr 22, 2026
Source: NVD
CVE-2026-33608 HIGH - 7.4

An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.

Vendor: PowerDNS
Product: Authoritative
Published: Apr 22, 2026
Source: NVD
CVE-2026-33602 MEDIUM - 6.5

A rogue backend can send a crafted UDP response with a query ID off by one related to the maximum configured value, triggering an out-of-bounds write leading to a denial of service.

Vendor: PowerDNS
Product: DNSdist
Published: Apr 22, 2026
Source: NVD

A rogue backend can send a crafted SVCB response to a Discovery of Designated Resolvers request, when requested via either the autoUpgrade (Lua) option to newServer or auto_upgrade (YAML) settings. DDR upgrade is not enabled by default.

Vendor: PowerDNS
Product: DNSdist
Published: Apr 22, 2026
Source: NVD
CVE-2026-33598 MEDIUM - 4.8

A cached crafted response can cause an out-of-bounds read if custom Lua code calls getDomainListByAddress() or getAddressListByDomain() on a packet cache.

Vendor: PowerDNS
Product: DNSdist
Published: Apr 22, 2026
Source: NVD

PRSD detection denial of service

Vendor: PowerDNS
Product: DNSdist
Published: Apr 22, 2026
Source: NVD

A client might theoretically be able to cause a mismatch between queries sent to a backend and the received responses by sending a flood of perfectly timed queries that are routed to a TCP-only or DNS over TLS backend.

Vendor: PowerDNS
Product: DNSdist
Published: Apr 22, 2026
Source: NVD
CVE-2026-33595 MEDIUM - 5.3

A client can trigger excessive memory allocation by generating a lot of errors responses over a single DoQ and DoH3 connection, as some resources were not properly released until the end of the connection.

Vendor: PowerDNS
Product: DNSdist
Published: Apr 22, 2026
Source: NVD
CVE-2026-33594 MEDIUM - 5.3

A client can trigger excessive memory allocation by generating a lot of queries that are routed to an overloaded DoH backend, causing queries to accumulate into a buffer that will not be released until the end of the connection.

Vendor: PowerDNS
Product: DNSdist
Published: Apr 22, 2026
Source: NVD
CVE-2026-33593 HIGH - 7.5

A client can trigger a divide by zero error leading to crash by sending a crafted DNSCrypt query.

Vendor: PowerDNS
Product: DNSdist
Published: Apr 22, 2026
Source: NVD
CVE-2026-33254 MEDIUM - 5.3

An attacker can create a large number of concurrent DoQ or DoH3 connections, causing unlimited memory allocation in DNSdist and leading to a denial of service. DOQ and DoH3 are disabled by default.

Vendor: PowerDNS
Product: DNSdist
Published: Apr 22, 2026
Source: NVD
CVE-2026-31530 HIGH - 7.8

In the Linux kernel, the following vulnerability has been resolved: cxl/port: Fix use after free of parent_port in cxl_detach_ep() cxl_detach_ep() is called during bottom-up removal when all CXL memory devices beneath a switch port have been removed. For each port in the hierarchy it locks both th...

Vendor: Linux
Product: Linux
Published: Apr 22, 2026
Source: NVD
CVE-2026-31529 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: cxl/region: Fix leakage in __construct_region() Failing the first sysfs_update_group() needs to explicitly kfree the resource as it is too early for cxl_region_iomem_release() to do so.

Vendor: Linux
Product: Linux
Published: Apr 22, 2026
Source: NVD
CVE-2026-31528 HIGH - 7.8

In the Linux kernel, the following vulnerability has been resolved: perf: Make sure to use pmu_ctx->pmu for groups Oliver reported that x86_pmu_del() ended up doing an out-of-bound memory access when group_sched_in() fails and needs to roll back. This *should* be handled by the transaction cal...

Vendor: Linux
Product: Linux
Published: Apr 22, 2026
Source: NVD