Search for packages
| purl | pkg:deb/debian/pdns@4.7.3-2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-6pjd-r9ca-rbgg
Aliases: CVE-2026-33611 |
An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend. |
Affected by 0 other vulnerabilities. |
|
VCID-6uz8-kz5m-8ya9
Aliases: CVE-2026-33608 |
An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it. |
Affected by 0 other vulnerabilities. |
|
VCID-chzq-qej6-rkdq
Aliases: CVE-2026-33257 |
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default. |
Affected by 0 other vulnerabilities. |
|
VCID-g4df-vh2e-abch
Aliases: CVE-2026-33609 |
Incomplete escaping of LDAP queries when running with 8bit-dns enabled allows users to perform queries of internal domain subtrees. |
Affected by 0 other vulnerabilities. |
|
VCID-pfhu-1qdf-p7d5
Aliases: CVE-2026-33260 |
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default. |
Affected by 0 other vulnerabilities. |
|
VCID-xa6z-cw1x-7qba
Aliases: CVE-2026-33610 |
A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-7dc3-qdk8-k7b2 | In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers. |
CVE-2022-27227
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-05-02T08:13:54.277143+00:00 | Debian Importer | Affected by | VCID-6uz8-kz5m-8ya9 | https://security-tracker.debian.org/tracker/data/json | 38.6.0 |
| 2026-05-02T07:16:54.590259+00:00 | Debian Importer | Affected by | VCID-pfhu-1qdf-p7d5 | https://security-tracker.debian.org/tracker/data/json | 38.6.0 |
| 2026-05-02T04:47:08.260298+00:00 | Debian Importer | Affected by | VCID-xa6z-cw1x-7qba | https://security-tracker.debian.org/tracker/data/json | 38.6.0 |
| 2026-05-02T04:15:17.022842+00:00 | Debian Importer | Affected by | VCID-chzq-qej6-rkdq | https://security-tracker.debian.org/tracker/data/json | 38.6.0 |
| 2026-05-02T03:28:59.564993+00:00 | Debian Importer | Fixing | VCID-7dc3-qdk8-k7b2 | https://security-tracker.debian.org/tracker/data/json | 38.6.0 |
| 2026-05-02T01:43:27.645412+00:00 | Debian Importer | Affected by | VCID-6pjd-r9ca-rbgg | https://security-tracker.debian.org/tracker/data/json | 38.6.0 |
| 2026-05-02T01:26:43.870799+00:00 | Debian Importer | Affected by | VCID-g4df-vh2e-abch | https://security-tracker.debian.org/tracker/data/json | 38.6.0 |
| 2026-04-16T11:30:43.739805+00:00 | Debian Importer | Fixing | VCID-7dc3-qdk8-k7b2 | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-13T07:50:47.457545+00:00 | Debian Importer | Fixing | VCID-7dc3-qdk8-k7b2 | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-08T19:13:15.526655+00:00 | Debian Importer | Fixing | VCID-7dc3-qdk8-k7b2 | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |