Browse all 3 CVE security advisories affecting The PowerDNS Project. AI-powered Chinese analysis, POCs, and references for each vulnerability.
PowerDNS provides authoritative DNS and DHCP server software, serving as a core infrastructure component for domain resolution and network management. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation, often stemming from input validation flaws and improper access controls. The project maintains a security-focused development approach, though it has faced incidents such as CVE-2020-12662, which allowed RCE through crafted DNS packets. With three CVEs currently on record, PowerDNS prioritizes rapid patching and security hardening, though its complex codebase and network-facing nature continue to present potential attack surfaces for determined adversaries.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2019-3871 | PowerDNS Authoritative Server 输入验证错误漏洞 — pdnsCWE-20 | 8.8 | - | 2019-03-21 |
| CVE-2018-10851 | PowerDNS Authoritative Server和PowerDNS Recursor 安全漏洞 — pdnsCWE-400 | 7.5 | - | 2018-11-29 |
| CVE-2018-14626 | PowerDNS Authoritative Server和PowerDNS Recursor 安全漏洞 — pdnsCWE-400 | 7.5 | - | 2018-11-29 |
This page lists every published CVE security advisory associated with The PowerDNS Project. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.