| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-3591 | A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass | ISC | BIND 9 | Medium | 5.4 | 2026-03-25 13:34:14 | Deep Dive |
| CVE-2026-3119 | Authenticated query containing a TKEY record may cause named to terminate unexpectedly | ISC | BIND 9 | Medium | 6.5 | 2026-03-25 13:31:55 | Deep Dive |
| CVE-2026-3104 | Memory leak in code preparing DNSSEC proofs of non-existence | ISC | BIND 9 | High | 7.5 | 2026-03-25 13:29:19 | Deep Dive |
| CVE-2026-1519 | Excessive NSEC3 iterations cause high CPU load during insecure delegation validation | ISC | BIND 9 | High | 7.5 | 2026-03-25 13:25:20 | Deep Dive |
| CVE-2026-3608 | Stack overflow in Kea daemons | ISC | Kea | High | 7.5 | 2026-03-25 08:46:49 | Deep Dive |
| CVE-2025-13878 | Malformed BRID/HHIT records can cause named to terminate unexpectedly | ISC | BIND 9 | High | 7.5 | 2026-01-21 14:43:27 | Deep Dive |
| CVE-2025-11232 | Invalid characters cause assert | ISC | Kea | High | 7.5 | 2025-10-29 18:02:39 | Deep Dive |
| CVE-2025-40780 | Cache poisoning due to weak PRNG | ISC | BIND 9 | High | 8.6 | 2025-10-22 15:48:27 | Deep Dive |
| CVE-2025-40778 | Cache poisoning attacks with unsolicited RRs | ISC | BIND 9 | High | 8.6 | 2025-10-22 15:47:13 | Deep Dive |
| CVE-2025-8677 | Resource exhaustion via malformed DNSKEY handling | ISC | BIND 9 | High | 7.5 | 2025-10-22 15:43:10 | Deep Dive |
| CVE-2025-8696 | DoS attack against the Stork UI from an unauthenticated user | ISC | Stork | High | 7.5 | 2025-09-10 17:59:53 | Deep Dive |
| CVE-2025-40779 | Kea crash upon interaction between specific client options and subnet selection | ISC | Kea | High | 7.5 | 2025-08-27 20:23:29 | Deep Dive |
| CVE-2025-40777 | A possible assertion failure when 'stale-answer-client-timeout' is set to '0' | ISC | BIND 9 | High | 7.5 | 2025-07-16 17:38:06 | Deep Dive |
| CVE-2025-40776 | Birthday Attack against Resolvers supporting ECS | ISC | BIND 9 | High | 8.6 | 2025-07-16 13:41:01 | Deep Dive |
| CVE-2025-32803 | Insecure file permissions can result in confidential information leakage | ISC | Kea | Medium | 4.0 | 2025-05-28 17:08:21 | Deep Dive |
| CVE-2025-32802 | Insecure handling of file paths allows multiple local attacks | ISC | Kea | Medium | 6.1 | 2025-05-28 17:08:11 | Deep Dive |
| CVE-2025-32801 | Loading a malicious hook library can lead to local privilege escalation | ISC | Kea | High | 7.8 | 2025-05-28 17:03:34 | Deep Dive |
| CVE-2025-40775 | DNS message with invalid TSIG causes an assertion failure | ISC | BIND 9 | High | 7.5 | 2025-05-21 12:35:02 | Deep Dive |
| CVE-2024-12705 | DNS-over-HTTPS implementation suffers from multiple issues under heavy query load | ISC | BIND 9 | High | 7.5 | 2025-01-29 21:40:28 | Deep Dive |
| CVE-2024-11187 | Many records in the additional section cause CPU exhaustion | ISC | BIND 9 | High | 7.5 | 2025-01-29 21:40:12 | Deep Dive |