Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
authoritative server vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-0206
common_startup.cc in PowerDNS (aka pdns) Authoritative Server prior to 2.9.22.5 and 3.x prior to 3.0.1 allows remote malicious users to cause a denial of service (packet loop) via a crafted UDP DNS response.
Powerdns Authoritative Server 3.0
Powerdns Authoritative Server
7.5
CVSSv3
CVE-2021-36754
PowerDNS Authoritative Server 4.5.0 prior to 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception.
Powerdns Authoritative Server
NA
CVE-2008-3337
PowerDNS Authoritative Server prior to 2.9.21.1 drops malformed queries, which might make it easier for remote malicious users to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217.
Powerdns Authoritative Server
Powerdns Powerdns
NA
CVE-2015-5311
PowerDNS (aka pdns) Authoritative Server 3.4.4 prior to 3.4.7 allows remote malicious users to cause a denial of service (assertion failure and server crash) via crafted query packets.
Powerdns Authoritative 3.4.6
Powerdns Authoritative 3.4.4
Powerdns Authoritative 3.4.5
NA
CVE-2015-5470
The label decompression functionality in PowerDNS Recursor prior to 3.6.4 and 3.7.x prior to 3.7.3 and Authoritative (Auth) Server prior to 3.3.3 and 3.4.x prior to 3.4.5 allows remote malicious users to cause a denial of service (CPU consumption or crash) via a request with a lo...
Powerdns Authoritative
Powerdns Authoritative 3.4.1
Powerdns Authoritative 3.4.2
Powerdns Authoritative 3.4.3
Powerdns Authoritative 3.4.4
Powerdns Authoritative 3.4.0
Powerdns Recursor
Powerdns Recursor 3.7.2
Powerdns Recursor 3.7.1
8.8
CVSSv3
CVE-2019-3871
A vulnerability was found in PowerDNS Authoritative Server prior to 4.0.7 and prior to 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denia...
Powerdns Authoritative Server
Fedoraproject Fedora 28
Fedoraproject Fedora 29
6.8
CVSSv3
CVE-2016-6172
PowerDNS (aka pdns) Authoritative Server prior to 4.0.1 allows remote primary DNS servers to cause a denial of service (memory exhaustion and secondary DNS server crash) via a large (1) AXFR or (2) IXFR response.
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Powerdns Authoritative Server
NA
CVE-2015-1868
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x prior to 3.6.3, and 3.7.x prior to 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x prior to 3.3.2, and 3.4.x prior to 3.4.4 allows remote malicious users to cause a denial of service (CPU consumption or cr...
Powerdns Authoritative 3.2
Powerdns Authoritative 3.3
Powerdns Authoritative 3.3.1
Powerdns Authoritative 3.3.2
Powerdns Authoritative 3.4.0
Powerdns Authoritative 3.4.1
Powerdns Authoritative 3.4.3
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Fedoraproject Fedora 22
Powerdns Recursor 3.5
Powerdns Recursor 3.6.0
Powerdns Recursor 3.6.1
Powerdns Recursor 3.6.2
Powerdns Recursor 3.5.3
Powerdns Recursor 3.6.3
Powerdns Recursor 3.7.1
Powerdns Recursor 3.5.2
Powerdns Recursor 3.5.1
7.5
CVSSv3
CVE-2019-10162
A vulnerability has been found in PowerDNS Authoritative Server prior to 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will ...
Powerdns Authoritative 4.0.0
Powerdns Authoritative
Opensuse Leap 15.0
Opensuse Leap 15.1
7.5
CVSSv3
CVE-2016-5426
PowerDNS (aka pdns) Authoritative Server prior to 3.4.10 allows remote malicious users to cause a denial of service (backend CPU consumption) via a long qname.
Powerdns Authoritative
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »