powerdns

Licenses: GPL-2.0

Direct Vulnerabilities

Known vulnerabilities in the https://downloads.powerdns.com|powerdns package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Integer Overflow or Wraparound

[,4.9.14)[5.0.0-alpha0,5.0.4)
  • M
Allocation of Resources Without Limits or Throttling

[,4.9.14)[5.0.0-alpha0,5.0.4)
  • M
LDAP Injection

[,4.9.14)[5.0.0-alpha0,5.0.4)
  • M
Allocation of Resources Without Limits or Throttling

[,4.9.14)[5.0.0-alpha0,5.0.4)
  • H
Arbitrary Code Injection

[,4.9.14)[5.0.0-alpha0,5.0.4)
  • H
Denial of Service (DoS)

[,4.9.14)[5.0.0-alpha0,5.0.4)
  • L
Denial of Service (DoS)

[,4.6.6)[4.7.0-alpha0,4.7.5)[4.8.0-alpha0,4.8.4)
  • M
Resource Management Errors

[4.0.0,4.0.7)
  • M
Denial of Service (DoS)

[,3.1.7.1)
  • H
Access Restriction Bypass

[4.1.4,4.1.9)
  • M
Denial of Service (DoS)

[,3.6.1)
  • H
Arbitrary Code Execution

[,3.1.4)
  • H
NULL Pointer Dereference

[,4.0.8)
  • C
Out-of-Bounds

[,3.2)
  • M
Resource Management Errors

[,3.6.2)
  • C
Improper Certificate Validation

[,4.1.9)
  • H
Denial of Service (DoS)

[,4.1.18)[4.2.0,4.2.5)[4.3.0,4.3.5)
  • M
Denial of Service (DoS)

[,3.1.7.1)
  • M
Denial of Service (DoS)

[,3.1.4)
  • M
Improper Verification of Cryptographic Signature

[4.0.0,4.0.7)
  • H
Out-of-bounds Read

[,4.1.8)
  • M
Cross-site Scripting (XSS)

[4.0.0,4.0.7)
  • H
Authentication Bypass

[,3.2)
  • H
Improper Input Validation

[,4.0.7)[4.1.0,4.1.7)
  • H
Denial of Service (DoS)

[,3.4.11)[4.0.0,4.0.2)
  • H
Race Condition

[,4.4.0)
  • H
Denial of Service (DoS)

[,4.4.0)
  • M
Denial of Service (DoS)

[4.0.0,4.0.9)[4.1.0,4.1.11)
  • H
Improper Input Validation

[3.4.0,3.4.6)
  • H
Resource Management Errors

[,3.4.10)
  • H
Resource Management Errors

[,3.6.4)
  • M
Improper Input Validation

[,3.7.4)[4.0.0,4.0.4)
  • M
Resource Management Errors

[,3.0)
  • M
Improper Input Validation

[,3.4.7)
  • H
Allocation of Resources Without Limits or Throttling

[3.2-rc1,3.3.3)[3.4.0-rc1,3.4.5)
  • H
Security Bypass

[,4.0.5)
  • M
Denial of Service (DoS)

[4.0.0,4.0.8)[4.1.0,4.1.9)
  • M
Denial of Service (DoS)

[,4.0.1)
  • C
Double Free

[,4.4.0)
  • H
Out-of-bounds Write

[,4.1.2)
  • H
Resource Management Errors

[,3.4.10)
  • H
Denial of Service (DoS)

[,3.7.4)[4.0.0,4.0.4)
  • M
Use of Uninitialized Resource

[,4.3.1)
  • M
Integer Overflow or Wraparound

[,3.4.11)[4.0.0,4.0.2)
  • H
Allocation of Resources Without Limits or Throttling

[4.1.0,4.1.5)
  • H
Allocation of Resources Without Limits or Throttling

[3.3.0,4.0.6)[4.1.0,4.1.5)
  • H
Access Restriction Bypass

[4.0.0,4.0.8)[4.1.0,4.1.10)
  • M
Improper Input Validation

[,4.0.4)