powerdns vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://downloads.powerdns.com|powerdns package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Input Validation

[,4.9.9)[5.0.0,5.0.9)[5.1.0,5.1.2)
  • M
Denial of Service (DoS)

[1.9.0,1.9.4)
  • L
Denial of Service (DoS)

[,4.6.6)[4.7.0-alpha0,4.7.5)[4.8.0-alpha0,4.8.4)
  • M
Resource Management Errors

[4.0.0,4.0.7)
  • M
CVE-2012-1193

[,3.3]
  • M
Denial of Service (DoS)

[,3.1.7.1)
  • H
Access Restriction Bypass

[4.1.4,4.1.9)
  • M
Denial of Service (DoS)

[,3.6.1)
  • H
Arbitrary Code Execution

[,3.1.4)
  • M
Improper Input Validation

[4.0.0,)
  • H
NULL Pointer Dereference

[,4.0.8)
  • C
Out-of-Bounds

[,3.2)
  • M
Resource Management Errors

[,3.6.2)
  • L
Improper Input Validation

[0,)
  • M
Incorrect Authorization

[,4.1.16][4.2.0,4.2.2][4.3.0,)
  • C
Improper Certificate Validation

[,4.1.9)
  • M
Improper Input Validation

[3.0,3.7.4][4.0.0,4.0.7)
  • H
Denial of Service (DoS)

[,4.1.18)[4.2.0,4.2.5)[4.3.0,4.3.5)
  • M
Denial of Service (DoS)

[,3.1.7.1)
  • M
Denial of Service (DoS)

[,3.1.4)
  • H
Improper Input Validation

[4.1.0,)
  • H
Buffer Overflow

[4.1.0,)
  • M
Improper Verification of Cryptographic Signature

[4.0.0,4.0.7)
  • H
Out-of-bounds Read

[,4.1.8)
  • H
Out-of-bounds Read

[4.1.0,)
  • M
Cross-site Scripting (XSS)

[4.0.0,4.0.7)
  • H
Authentication Bypass

[,3.2)
  • H
Cross-site Request Forgery (CSRF)

[,1.1.0]
  • M
Improper Input Validation

[,1.3.3)
  • H
Improper Input Validation

[,4.0.7)[4.1.0,4.1.7)
  • H
Denial of Service (DoS)

[,3.4.11)[4.0.0,4.0.2)
  • H
Race Condition

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[4.0.0,4.0.9)[4.1.0,4.1.11)
  • H
Improper Input Validation

[3.4.0,3.4.6)
  • H
Resource Management Errors

[,3.4.10)
  • H
Resource Management Errors

[,3.6.4)
  • M
Improper Input Validation

[,3.7.4)[4.0.0,4.0.4)
  • M
Resource Management Errors

[,3.0)
  • M
Improper Input Validation

[,3.4.7)
  • H
Resource Management Errors

[,3.3.2)[3.4.0,3.4.4)[3.6.0,3.6.3)[3.7.0,3.7.2)
  • H
Security Bypass

[3.0,3.4.11][4.0.0,4.0.5)
  • M
Denial of Service (DoS)

[4.0.0,4.0.8)[4.1.0,4.1.9)
  • M
Denial of Service (DoS)

[,4.0.1)
  • C
Double Free

[0,)
  • H
Out-of-bounds Write

[,4.1.2)
  • H
Resource Management Errors

[,3.4.10)
  • H
Denial of Service (DoS)

[,3.7.4)[4.0.0,4.0.4)
  • M
Use of Uninitialized Resource

[,4.3.1)
  • M
Integer Overflow or Wraparound

[,3.4.11)[4.0.0,4.0.2)
  • H
Improper Data Handling

[4.0.0,)
  • H
Resource Management Errors

[3.2,)
  • H
Access Restriction Bypass

[4.0.0,4.0.8)[4.1.0,4.1.10)
  • M
Improper Input Validation

[,4.0.4)