Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
powerdns authoritative vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2016-7073
An issue has been found in PowerDNS prior to 3.4.11 and 4.0.2, and PowerDNS recursor prior to 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check of the TSIG time and f...
Powerdns Recursor
Powerdns Authoritative
Debian Debian Linux 8.0
4.3
CVSSv2
CVE-2016-7074
An issue has been found in PowerDNS prior to 3.4.11 and 4.0.2, and PowerDNS recursor prior to 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check that the TSIG record i...
Powerdns Authoritative
Powerdns Recursor
Debian Debian Linux 8.0
5
CVSSv2
CVE-2016-7072
An issue has been found in PowerDNS Authoritative Server prior to 3.4.11 and 4.0.2 allowing a remote, unauthenticated malicious user to cause a denial of service by opening a large number of TCP connections to the web server. If the web server runs out of file descriptors, it tri...
Powerdns Authoritative
Debian Debian Linux 8.0
5
CVSSv2
CVE-2017-15120
An issue has been found in the parsing of authoritative answers in PowerDNS Recursor prior to 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a den...
Powerdns Recursor
Debian Debian Linux 8.0
Debian Debian Linux 9.0
1 Github repository
9.3
CVSSv2
CVE-2018-1046
pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. T...
Powerdns Pdns
5.5
CVSSv2
CVE-2017-15091
An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via...
Powerdns Authoritative
1 Article
7.1
CVSSv2
CVE-2016-6172
PowerDNS (aka pdns) Authoritative Server prior to 4.0.1 allows remote primary DNS servers to cause a denial of service (memory exhaustion and secondary DNS server crash) via a large (1) AXFR or (2) IXFR response.
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Powerdns Authoritative Server
5
CVSSv2
CVE-2016-5426
PowerDNS (aka pdns) Authoritative Server prior to 3.4.10 allows remote malicious users to cause a denial of service (backend CPU consumption) via a long qname.
Powerdns Authoritative
5
CVSSv2
CVE-2016-5427
PowerDNS (aka pdns) Authoritative Server prior to 3.4.10 does not properly handle a . (dot) inside labels, which allows remote malicious users to cause a denial of service (backend CPU consumption) via a crafted DNS query.
Powerdns Authoritative
5
CVSSv2
CVE-2015-5311
PowerDNS (aka pdns) Authoritative Server 3.4.4 prior to 3.4.7 allows remote malicious users to cause a denial of service (assertion failure and server crash) via crafted query packets.
Powerdns Authoritative 3.4.6
Powerdns Authoritative 3.4.4
Powerdns Authoritative 3.4.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »