Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
powerdns vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2016-5426
PowerDNS (aka pdns) Authoritative Server prior to 3.4.10 allows remote malicious users to cause a denial of service (backend CPU consumption) via a long qname.
Powerdns Authoritative
445
VMScore
CVE-2016-5427
PowerDNS (aka pdns) Authoritative Server prior to 3.4.10 does not properly handle a . (dot) inside labels, which allows remote malicious users to cause a denial of service (backend CPU consumption) via a crafted DNS query.
Powerdns Authoritative
356
VMScore
CVE-2019-10203
PowerDNS Authoritative daemon , pdns versions 4.0.x prior to 4.0.9, 4.1.x prior to 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.
Powerdns Authoritative Server
383
VMScore
CVE-2017-15090
An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in ...
Powerdns Recursor
1 Article
490
VMScore
CVE-2017-15091
An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via...
Powerdns Authoritative
1 Article
383
VMScore
CVE-2017-15092
A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote malicious user to inject HTML and Javascript code into the web interfac...
Powerdns Recursor
1 Article
312
VMScore
CVE-2017-15093
When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor's ACL by adding and removing netmasks, and to conf...
Powerdns Recursor
1 Article
383
VMScore
CVE-2017-15094
An issue has been found in the DNSSEC parsing code of PowerDNS Recursor from 4.0.0 up to and including 4.0.6 leading to a memory leak when parsing specially crafted DNSSEC ECDSA keys. These keys are only parsed when validation is enabled by setting dnssec to a value other than of...
Powerdns Recursor
1 Article
605
VMScore
CVE-2008-1637
PowerDNS Recursor prior to 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote malicious users to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external li...
Powerdns Recursor
356
VMScore
CVE-2020-17482
An issue has been found in PowerDNS Authoritative Server prior to 4.3.1 where an authorized user with the ability to insert crafted records into a zone might be able to leak the content of uninitialized memory.
Powerdns Authoritative
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »