| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-33597 | PRSD detection denial of service | PowerDNS | DNSdist | Low | 3.7 | 2026-04-22 13:47:35 | Deep Dive |
| CVE-2026-33596 | TCP backend stream ID overflow | PowerDNS | DNSdist | Low | 3.1 | 2026-04-22 13:47:10 | Deep Dive |
| CVE-2026-33598 | Out-of-bounds read in cache inspection via Lua | PowerDNS | DNSdist | Medium | 4.8 | 2026-04-22 13:46:46 | Deep Dive |
| CVE-2026-33599 | Out-of-bounds read in service discovery | PowerDNS | DNSdist | Low | 3.1 | 2026-04-22 13:46:05 | Deep Dive |
| CVE-2026-6862 | Efivar: efivar: denial of service due to stack overflow in device path node parsing | Red Hat | Red Hat Enterprise Linux 10 | Medium | 5.5 | 2026-04-22 13:45:46 | Deep Dive |
| CVE-2026-33602 | Off-by-one access when processing crafted UDP responses | PowerDNS | DNSdist | Medium | 6.5 | 2026-04-22 13:45:35 | Deep Dive |
| CVE-2026-33254 | Resource exhaustion via DoQ/DoH3 connections | PowerDNS | DNSdist | Medium | 5.3 | 2026-04-22 13:45:07 | Deep Dive |
| CVE-2026-6861 | Emacs: emacs: memory corruption vulnerability when processing svg css | Red Hat | Red Hat Enterprise Linux 10 | Medium | 6.1 | 2026-04-22 13:39:41 | Deep Dive |
| CVE-2026-5750 | Insecure direct object reference (IDOR) vulnerability in Fullstep | Fullstep | Fullstep | - | - | 2026-04-22 13:25:26 | Deep Dive |
| CVE-2026-5749 | Inadequate access control vulnerability in Fullstep | Fullstep | Fullstep | - | - | 2026-04-22 13:23:38 | Deep Dive |
| CVE-2026-6356 | CVE-2026-6356 | Augmentt | Augmentt | - | - | 2026-04-22 13:18:18 | Deep Dive |
| CVE-2026-6355 | CVE-2026-6355 | Augmentt | Augmentt | - | - | 2026-04-22 13:18:05 | Deep Dive |
| CVE-2026-41651 | PackageKit vulnerable to TOCTOU Race on Transaction Flags leads to arbitrary package installation as root | PackageKit | PackageKit | High | 8.8 | 2026-04-22 13:11:40 | Deep Dive |
| CVE-2026-6859 | Instructlab: instructlab: arbitrary code execution due to hardcoded `trust_remote_code=true` | Red Hat | Red Hat Enterprise Linux AI (RHEL AI) 3 | High | 8.8 | 2026-04-22 13:04:05 | Deep Dive |
| CVE-2026-0539 | Local Privilege Escalation in pcvisit service client | pcvisit | pcvisit Remote Host Modul | - | - | 2026-04-22 13:02:02 | Deep Dive |
| CVE-2026-6857 | Camel-infinispan: camel-infinispan: remote code execution via unsafe deserialization | Red Hat | Red Hat build of Apache Camel 4 for Quarkus 3 | High | 7.5 | 2026-04-22 12:55:01 | Deep Dive |
| CVE-2026-6855 | Instructlab: instructlab: path traversal allows arbitrary directory creation and file write | Red Hat | Red Hat Enterprise Linux AI (RHEL AI) 3 | High | 7.1 | 2026-04-22 12:29:45 | Deep Dive |
| CVE-2026-33262 | Insufficient validation of cookie reply | PowerDNS | Recursor | Medium | 5.9 | 2026-04-22 09:40:24 | Deep Dive |
| CVE-2026-33261 | Null pointer accces in aggressive NSEC(3) cache | PowerDNS | Recursor | Medium | 5.9 | 2026-04-22 09:40:04 | Deep Dive |
| CVE-2026-33260 | Insufficient input validation of internal webserver | PowerDNS | Authoritative | Medium | 5.3 | 2026-04-22 09:39:36 | Deep Dive |