Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pdnsd pdnsd 1.1.10-par vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2006-2076
Memory leak in Paul Rombouts pdnsd prior to 1.2.4 allows remote malicious users to cause a denial of service (memory consumption) via a DNS query with an unsupported (1) QTYPE or (2) QCLASS, as demonstrated by the OUSPG PROTOS DNS test suite.
Pdnsd Pdnsd 1.0.13
Pdnsd Pdnsd 1.0.15
Pdnsd Pdnsd 1.1
Pdnsd Pdnsd 1.1.1
Pdnsd Pdnsd 1.1.2
Pdnsd Pdnsd 1.1.3
Pdnsd Pdnsd 1.1.4
Pdnsd Pdnsd 1.1.5
Pdnsd Pdnsd 1.1.6
Pdnsd Pdnsd 1.1.7a
Pdnsd Pdnsd 1.1.8b1 Par5
Pdnsd Pdnsd 1.1.8b1 Par6
10
CVSSv2
CVE-2006-2077
Buffer overflow in Paul Rombouts pdnsd prior to 1.2.4 has unknown impact and attack vectors. NOTE: this issue might be related to the OUSPG PROTOS DNS test suite.
Pdnsd Pdnsd 1.0.13
Pdnsd Pdnsd 1.0.15
Pdnsd Pdnsd 1.1
Pdnsd Pdnsd 1.1.1
Pdnsd Pdnsd 1.1.2
Pdnsd Pdnsd 1.1.3
Pdnsd Pdnsd 1.1.4
Pdnsd Pdnsd 1.1.5
Pdnsd Pdnsd 1.1.6
Pdnsd Pdnsd 1.1.7a
Pdnsd Pdnsd 1.1.8b1 Par5
Pdnsd Pdnsd 1.1.8b1 Par6
5
CVSSv2
CVE-2008-4194
The p_exec_query function in src/dns_query.c in pdnsd prior to 1.2.7-par allows remote malicious users to cause a denial of service (daemon crash) via a long DNS reply with many entries in the answer section, related to a "dangling pointer bug."
Pdnsd Pdnsd
Pdnsd Pdnsd 1.1.7
Pdnsd Pdnsd 1.1.7a
Pdnsd Pdnsd 1.1.8b1-par4
Pdnsd Pdnsd 1.1.8b1-par5
Pdnsd Pdnsd 1.1.8b1-par6
Pdnsd Pdnsd 1.1.8b1-par7
Pdnsd Pdnsd 1.1.8b1-par8
Pdnsd Pdnsd 1.1.9-par
Pdnsd Pdnsd 1.1.10-par
Pdnsd Pdnsd 1.1.11-par
Pdnsd Pdnsd 1.1.11a-par
3 EDB exploits
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2024-51941
CVE-2024-24417
server-side request forgery
jd edwards enterpriseone tools
google
hardcoded
CVE-2025-21569
weblogic server
IDOR
CVE-2024-24418
CVE-2024-55591
CVE-2024-49138
peoplesoft enterprise cc common application objects
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started