Browse all 34 CVE security advisories affecting Dnnsoftware. AI-powered Chinese analysis, POCs, and references for each vulnerability.
DNNSoftware specializes in DNS management solutions, primarily serving enterprise environments with its PowerDNS Recursor and authoritative servers. The software has historically been associated with a significant number of vulnerabilities, currently totaling 34 CVEs. These security issues predominantly involve remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation or memory corruption errors within the application logic. While the platform is widely deployed for its performance and scalability, the recurring nature of these defects highlights challenges in maintaining rigorous code security standards over time. Notable incidents have included critical exploits allowing unauthenticated attackers to gain system-level access, prompting urgent patching cycles. Despite these challenges, the vendor continues to address these gaps through regular updates, though the high volume of recorded CVEs remains a point of concern for security auditors evaluating the software’s risk posture.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-32036 | DNN allows the possibility of bypassing Captcha — Dnn.PlatformCWE-804 | 4.2 | Medium | 2025-04-08 |
| CVE-2025-32035 | DNN does not check the contents of a file when uploading files — Dnn.PlatformCWE-351 | 2.6 | Low | 2025-04-08 |
| CVE-2022-2922 | Relative Path Traversal in dnnsoftware/dnn.platform — dnnsoftware/dnn.platformCWE-23 | 7.5 | - | 2022-09-30 |
| CVE-2021-40186 | DNN CMS Server-Side Request Forgery (SSRF) — DNN PlatformCWE-918 | 6.5 | Medium | 2022-05-31 |
This page lists every published CVE security advisory associated with Dnnsoftware. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.