Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

PowerDNS — Vulnerabilities & Security Advisories 53

Browse all 53 CVE security advisories affecting PowerDNS. AI-powered Chinese analysis, POCs, and references for each vulnerability.

PowerDNS is an open-source authoritative and recursive DNS server widely deployed to resolve domain names for internet infrastructure. Its extensive attack surface has resulted in fifty-three recorded CVEs, reflecting the complexity of its configuration and extension mechanisms. Historically, vulnerabilities have predominantly involved remote code execution, buffer overflows, and denial-of-service conditions, often stemming from improper input validation in the recursor or authoritative server components. While the software itself is robust, security incidents frequently arise from misconfigurations or unpatched third-party modules rather than fundamental architectural flaws. The project maintains a responsible disclosure process, though the high volume of past issues highlights the challenges of maintaining security in a feature-rich, C++-based codebase. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with these known weaknesses in the DNS resolution ecosystem.

Found 20 results / 53Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-33593 Denial of service via crafted DNSCrypt query — DNSdist 7.5 High2026-04-22
CVE-2026-33594 Outgoing DoH excessive memory allocation — DNSdist 5.3 Medium2026-04-22
CVE-2026-33595 DoQ/DoH3 excessive memory allocation — DNSdist 5.3 Medium2026-04-22
CVE-2026-33597 PRSD detection denial of service — DNSdist 3.7 Low2026-04-22
CVE-2026-33596 TCP backend stream ID overflow — DNSdist 3.1 Low2026-04-22
CVE-2026-33598 Out-of-bounds read in cache inspection via Lua — DNSdist 4.8 Medium2026-04-22
CVE-2026-33599 Out-of-bounds read in service discovery — DNSdist 3.1 Low2026-04-22
CVE-2026-33602 Off-by-one access when processing crafted UDP responses — DNSdist 6.5 Medium2026-04-22
CVE-2026-33254 Resource exhaustion via DoQ/DoH3 connections — DNSdist 5.3 Medium2026-04-22
CVE-2026-27854 Use after free when parsing EDNS options in Lua — DNSdist 4.8 Medium2026-03-31
CVE-2026-27853 Out-of-bounds write when rewriting large DNS packets — DNSdist 5.9 Medium2026-03-31
CVE-2026-24030 Unbounded memory allocation for DoQ and DoH3 — DNSdist 5.3 Medium2026-03-31
CVE-2026-24029 DNS over HTTPS ACL bypass — DNSdist 6.5 Medium2026-03-31
CVE-2026-24028 Out-of-bounds read when parsing DNS packets via Lua — DNSdist 5.3 Medium2026-03-31
CVE-2026-0397 Information disclosure via CORS misconfiguration — DNSdist 3.1 Low2026-03-31
CVE-2026-0396 HTML injection in the web dashboard — DNSdist 3.1 Low2026-03-31
CVE-2025-30187 Denial of service via crafted DoH exchange in PowerDNS DNSdist — DNSdistCWE-835 3.7 Low2025-09-18
CVE-2025-30193 Denial of service via crafted TCP exchange — DNSdistCWE-674 7.5 High2025-05-20
CVE-2025-30194 Denial of service via crafted DoH exchange — DNSdistCWE-416 7.5 High2025-04-29
CVE-2024-25581 Transfer requests received over DoH can lead to a denial of service in DNSdist — DNSdistCWE-20 7.5 High2024-05-13

This page lists every published CVE security advisory associated with PowerDNS. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.