pdns-recursor

Direct Vulnerabilities

Known vulnerabilities in the pdns-recursor package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2026-33262

<5.4.1-1
  • L
CVE-2026-33256

<5.4.1-1
  • L
CVE-2026-33601

<5.4.1-1
  • L
CVE-2026-33600

<5.4.1-1
  • L
CVE-2026-33261

<5.4.1-1
  • L
CVE-2026-33259

<5.4.1-1
  • L
CVE-2026-33257

<5.3.0-1
  • L
CVE-2026-33258

<5.4.1-1
  • L
CVE-2026-33260

<5.3.0-1
  • L
Authentication Bypass

<5.3.5-1
  • L
CVE-2026-0398

<5.3.5-1
  • L
CVE-2025-59029

<5.3.3-1
  • L
CVE-2025-59030

<5.3.3-1
  • L
Authentication Bypass

<5.3.1-1
  • L
Insufficient Verification of Data Authenticity

<5.3.1-1
  • H
CVE-2023-50868

<4.9.3-1
  • L
Incorrect Authorization

<4.3.2-1
  • H
Uncontrolled Recursion

<4.8.1-1
  • H
Out-of-Bounds

<3.1.7.2-1
  • L
Improper Input Validation

<4.1.1-1
  • H
CVE-2022-27227

<4.6.1-1
  • H
Out-of-bounds Read

<4.1.8-1
  • C
Improper Certificate Validation

<4.1.9-1
  • H
Resource Exhaustion

<4.1.7-1
  • M
Resource Management Errors

<3.6.2-1
  • H
Resource Management Errors

<3.7.3-1
  • M
Numeric Errors

<3.1.7-1
  • M
Resource Management Errors

<3.0.1-1
  • H
CVE-2009-4010

<3.1.7.2-1
  • H
NULL Pointer Dereference

<4.1.0-1
  • L
CVE-2024-25590

<5.0.9-1
  • M
CVE-2023-26437

<4.8.4-1
  • L
CVE-2025-30195

<5.2.1-1
  • H
Resource Exhaustion

<4.0.4-1
  • M
CVE-2006-4252

<3.1.4-1
  • M
CVE-2014-3614

<3.6.1-1
  • M
Missing Release of Resource after Effective Lifetime

<4.0.7-1
  • H
Resource Management Errors

<3.7.2-1
  • L
CVE-2025-30192

<5.2.4-2
  • L
CVE-2024-25583

<4.9.5-1
  • L
Out-of-bounds Read

<4.3.1-1
  • H
Improperly Implemented Security Check for Standard

<4.1.9-1
  • M
Improper Input Validation

<4.1.7-1
  • H
Missing Release of Resource after Effective Lifetime

<4.1.7-1
  • M
Incomplete Cleanup

<4.7.2-1
  • M
Improper Input Validation

<4.0.4-1
  • H
Uncontrolled Recursion

<4.3.1-1
  • H
CVE-2020-25829

<4.3.5-1
  • H
Improper Input Validation

<4.3.1-1
  • H
Allocation of Resources Without Limits or Throttling

<4.9.3-1
  • M
Improper Input Validation

<4.0.7-1
  • H
CVE-2006-4251

<3.1.4-1