Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
powerdns authoritative server vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-0206
common_startup.cc in PowerDNS (aka pdns) Authoritative Server prior to 2.9.22.5 and 3.x prior to 3.0.1 allows remote malicious users to cause a denial of service (packet loop) via a crafted UDP DNS response.
Powerdns Authoritative Server
Powerdns Authoritative Server 3.0
NA
CVE-2015-5470
The label decompression functionality in PowerDNS Recursor prior to 3.6.4 and 3.7.x prior to 3.7.3 and Authoritative (Auth) Server prior to 3.3.3 and 3.4.x prior to 3.4.5 allows remote malicious users to cause a denial of service (CPU consumption or crash) via a request with a lo...
Powerdns Authoritative 3.4.1
Powerdns Authoritative
Powerdns Authoritative 3.4.2
Powerdns Authoritative 3.4.0
Powerdns Authoritative 3.4.3
Powerdns Authoritative 3.4.4
Powerdns Recursor 3.7.2
Powerdns Recursor
Powerdns Recursor 3.7.1
NA
CVE-2008-3337
PowerDNS Authoritative Server prior to 2.9.21.1 drops malformed queries, which might make it easier for remote malicious users to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217.
Powerdns Authoritative Server
Powerdns Powerdns
NA
CVE-2015-5311
PowerDNS (aka pdns) Authoritative Server 3.4.4 prior to 3.4.7 allows remote malicious users to cause a denial of service (assertion failure and server crash) via crafted query packets.
Powerdns Authoritative 3.4.5
Powerdns Authoritative 3.4.6
Powerdns Authoritative 3.4.4
NA
CVE-2015-1868
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x prior to 3.6.3, and 3.7.x prior to 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x prior to 3.3.2, and 3.4.x prior to 3.4.4 allows remote malicious users to cause a denial of service (CPU consumption or cr...
Powerdns Authoritative 3.4.1
Powerdns Authoritative 3.3.1
Powerdns Authoritative 3.3
Powerdns Authoritative 3.2
Powerdns Authoritative 3.4.0
Powerdns Authoritative 3.4.3
Powerdns Authoritative 3.3.2
Fedoraproject Fedora 22
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Powerdns Recursor 3.6.2
Powerdns Recursor 3.6.0
Powerdns Recursor 3.5.3
Powerdns Recursor 3.6.3
Powerdns Recursor 3.5
Powerdns Recursor 3.5.1
Powerdns Recursor 3.6.1
Powerdns Recursor 3.7.1
Powerdns Recursor 3.5.2
7.5
CVSSv3
CVE-2021-36754
PowerDNS Authoritative Server 4.5.0 prior to 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception.
Powerdns Authoritative Server
4.3
CVSSv3
CVE-2019-10203
PowerDNS Authoritative daemon , pdns versions 4.0.x prior to 4.0.9, 4.1.x prior to 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.
Powerdns Authoritative Server
7.5
CVSSv3
CVE-2019-10162
A vulnerability has been found in PowerDNS Authoritative Server prior to 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will ...
Powerdns Authoritative
Powerdns Authoritative 4.0.0
Opensuse Leap 15.0
Opensuse Leap 15.1
7.5
CVSSv3
CVE-2018-10851
PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.
Powerdns Recursor
Powerdns Authoritative
7.5
CVSSv3
CVE-2018-14626
PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service.
Powerdns Recursor
Powerdns Authoritative
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »