Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
authoritative vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-5470
The label decompression functionality in PowerDNS Recursor prior to 3.6.4 and 3.7.x prior to 3.7.3 and Authoritative (Auth) Server prior to 3.3.3 and 3.4.x prior to 3.4.5 allows remote malicious users to cause a denial of service (CPU consumption or crash) via a request with a lo...
Powerdns Authoritative
Powerdns Authoritative 3.4.1
Powerdns Authoritative 3.4.2
Powerdns Authoritative 3.4.3
Powerdns Authoritative 3.4.4
Powerdns Authoritative 3.4.0
Powerdns Recursor
Powerdns Recursor 3.7.2
Powerdns Recursor 3.7.1
NA
CVE-2015-5311
PowerDNS (aka pdns) Authoritative Server 3.4.4 prior to 3.4.7 allows remote malicious users to cause a denial of service (assertion failure and server crash) via crafted query packets.
Powerdns Authoritative 3.4.6
Powerdns Authoritative 3.4.4
Powerdns Authoritative 3.4.5
NA
CVE-2012-0206
common_startup.cc in PowerDNS (aka pdns) Authoritative Server prior to 2.9.22.5 and 3.x prior to 3.0.1 allows remote malicious users to cause a denial of service (packet loop) via a crafted UDP DNS response.
Powerdns Authoritative Server 3.0
Powerdns Authoritative Server
NA
CVE-2015-1868
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x prior to 3.6.3, and 3.7.x prior to 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x prior to 3.3.2, and 3.4.x prior to 3.4.4 allows remote malicious users to cause a denial of service (CPU consumption or cr...
Powerdns Authoritative 3.2
Powerdns Authoritative 3.3
Powerdns Authoritative 3.3.1
Powerdns Authoritative 3.3.2
Powerdns Authoritative 3.4.0
Powerdns Authoritative 3.4.1
Powerdns Authoritative 3.4.3
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Fedoraproject Fedora 22
Powerdns Recursor 3.5
Powerdns Recursor 3.6.0
Powerdns Recursor 3.6.1
Powerdns Recursor 3.6.2
Powerdns Recursor 3.5.3
Powerdns Recursor 3.6.3
Powerdns Recursor 3.7.1
Powerdns Recursor 3.5.2
Powerdns Recursor 3.5.1
7.5
CVSSv3
CVE-2019-10162
A vulnerability has been found in PowerDNS Authoritative Server prior to 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will ...
Powerdns Authoritative 4.0.0
Powerdns Authoritative
Opensuse Leap 15.0
Opensuse Leap 15.1
7.1
CVSSv3
CVE-2017-15091
An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via...
Powerdns Authoritative
1 Article
7.5
CVSSv3
CVE-2016-5426
PowerDNS (aka pdns) Authoritative Server prior to 3.4.10 allows remote malicious users to cause a denial of service (backend CPU consumption) via a long qname.
Powerdns Authoritative
7.5
CVSSv3
CVE-2016-5427
PowerDNS (aka pdns) Authoritative Server prior to 3.4.10 does not properly handle a . (dot) inside labels, which allows remote malicious users to cause a denial of service (backend CPU consumption) via a crafted DNS query.
Powerdns Authoritative
4.3
CVSSv3
CVE-2020-17482
An issue has been found in PowerDNS Authoritative Server prior to 4.3.1 where an authorized user with the ability to insert crafted records into a zone might be able to leak the content of uninitialized memory.
Powerdns Authoritative
8.1
CVSSv3
CVE-2020-24696
An issue exists in PowerDNS Authoritative up to and including 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG si...
Powerdns Authoritative
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »