Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
powerdns recursor 3.6.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-5470
The label decompression functionality in PowerDNS Recursor prior to 3.6.4 and 3.7.x prior to 3.7.3 and Authoritative (Auth) Server prior to 3.3.3 and 3.4.x prior to 3.4.5 allows remote malicious users to cause a denial of service (CPU consumption or crash) via a request with a lo...
Powerdns Authoritative
Powerdns Authoritative 3.4.1
Powerdns Authoritative 3.4.2
Powerdns Authoritative 3.4.3
Powerdns Authoritative 3.4.4
Powerdns Authoritative 3.4.0
Powerdns Recursor
Powerdns Recursor 3.7.2
Powerdns Recursor 3.7.1
NA
CVE-2015-1868
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x prior to 3.6.3, and 3.7.x prior to 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x prior to 3.3.2, and 3.4.x prior to 3.4.4 allows remote malicious users to cause a denial of service (CPU consumption or cr...
Powerdns Authoritative 3.2
Powerdns Authoritative 3.3
Powerdns Authoritative 3.3.1
Powerdns Authoritative 3.3.2
Powerdns Authoritative 3.4.0
Powerdns Authoritative 3.4.1
Powerdns Authoritative 3.4.3
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Fedoraproject Fedora 22
Powerdns Recursor 3.5
Powerdns Recursor 3.6.0
Powerdns Recursor 3.6.1
Powerdns Recursor 3.6.2
Powerdns Recursor 3.5.3
Powerdns Recursor 3.6.3
Powerdns Recursor 3.7.1
Powerdns Recursor 3.5.2
Powerdns Recursor 3.5.1
NA
CVE-2014-8601
PowerDNS Recursor prior to 3.6.2 does not limit delegation chaining, which allows remote malicious users to cause a denial of service ("performance degradations") via a large or infinite number of referrals, as demonstrated by resolving domains hosted by ezdns.it.
Debian Debian Linux 7.0
Powerdns Recursor
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started