Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-33258

Summary
Assigner-OX
Assigner Org ID-8ce71d90-2354-404b-a86e-bec2cc4e6981
Published At-22 Apr, 2026 | 09:38
Updated At-22 Apr, 2026 | 18:10
Rejected At-
Credits

Crafted zones can cause increased resource usage

By publishing and querying a crafted zone an attacker can cause allocation of large entries in the negative and aggressive NSEC(3) caches.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:OX
Assigner Org ID:8ce71d90-2354-404b-a86e-bec2cc4e6981
Published At:22 Apr, 2026 | 09:38
Updated At:22 Apr, 2026 | 18:10
Rejected At:
â–¼CVE Numbering Authority (CNA)
Crafted zones can cause increased resource usage

By publishing and querying a crafted zone an attacker can cause allocation of large entries in the negative and aggressive NSEC(3) caches.

Affected Products
Vendor
PowerDNS
Product
Recursor
Collection URL
https://repo.powerdns.com/
Package Name
pdns-recursor
Repo
https://github.com/PowerDNS/pdns
Modules
  • Negative cache
  • Aggressive use of NSEC cache
Program Files
  • aggressive_nsec.cc
  • negcache.cc
Default Status
unaffected
Versions
Affected
  • From 5.4.0 before 5.4.1 (semver)
  • From 5.3.0 before 5.3.6 (semver)
  • From 5.2.0 before 5.2.9 (semver)
Problem Types
TypeCWE IDDescription
CWEAllocationAllocation of Resources Without Limits or Throttling
Type: CWE
CWE ID: Allocation
Description: Allocation of Resources Without Limits or Throttling
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Haruto Kimura (Stella)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
N/A
Hyperlink: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-770CWE-770 Allocation of Resources Without Limits or Throttling
Type: CWE
CWE ID: CWE-770
Description: CWE-770 Allocation of Resources Without Limits or Throttling
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@open-xchange.com
Published At:22 Apr, 2026 | 10:16
Updated At:27 Apr, 2026 | 17:03

By publishing and querying a crafted zone an attacker can cause allocation of large entries in the negative and aggressive NSEC(3) caches.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

powerdns
powerdns
>>recursor>>Versions from 5.2.0(inclusive) to 5.2.9(exclusive)
cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
powerdns
powerdns
>>recursor>>Versions from 5.3.0(inclusive) to 5.3.6(exclusive)
cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
powerdns
powerdns
>>recursor>>5.4.0
cpe:2.3:a:powerdns:recursor:5.4.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-770Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-770
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.htmlsecurity@open-xchange.com
Vendor Advisory
Broken Link
Hyperlink: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
Source: security@open-xchange.com
Resource:
Vendor Advisory
Broken Link

Change History

0
Information is not available yet

Similar CVEs

778Records found

CVE-2026-33594
Matching Score-10
Assigner-Open-Xchange
ShareView Details
Matching Score-10
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 1.24%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 13:48
Updated-24 Apr, 2026 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Outgoing DoH excessive memory allocation

A client can trigger excessive memory allocation by generating a lot of queries that are routed to an overloaded DoH backend, causing queries to accumulate into a buffer that will not be released until the end of the connection.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-dnsdistDNSdist
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-33595
Matching Score-10
Assigner-Open-Xchange
ShareView Details
Matching Score-10
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 1.24%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 13:47
Updated-24 Apr, 2026 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DoQ/DoH3 excessive memory allocation

A client can trigger excessive memory allocation by generating a lot of errors responses over a single DoQ and DoH3 connection, as some resources were not properly released until the end of the connection.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-dnsdistDNSdist
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-33256
Matching Score-10
Assigner-Open-Xchange
ShareView Details
Matching Score-10
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.00% / 0.08%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 09:37
Updated-27 Apr, 2026 | 17:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unbounded memory allocation by internal web server

An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-recursorRecursor
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-33257
Matching Score-10
Assigner-Open-Xchange
ShareView Details
Matching Score-10
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.99%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 09:37
Updated-27 Apr, 2026 | 17:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient input validation of internal webserver

An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-authoritativednsdistrecursorRecursorDNSdistAuthoritative
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-33260
Matching Score-10
Assigner-Open-Xchange
ShareView Details
Matching Score-10
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.99%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 09:39
Updated-27 Apr, 2026 | 17:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient input validation of internal webserver

An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-authoritativednsdistrecursorRecursorDNSdistAuthoritative
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-33254
Matching Score-10
Assigner-Open-Xchange
ShareView Details
Matching Score-10
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 1.11%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 13:45
Updated-27 Apr, 2026 | 16:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Resource exhaustion via DoQ/DoH3 connections

An attacker can create a large number of concurrent DoQ or DoH3 connections, causing unlimited memory allocation in DNSdist and leading to a denial of service. DOQ and DoH3 are disabled by default.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-dnsdistDNSdist
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-0398
Matching Score-10
Assigner-Open-Xchange
ShareView Details
Matching Score-10
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.28%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 14:20
Updated-20 Apr, 2026 | 14:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor

Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-recursorRecursor
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2023-50387
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-51.99% / 97.92%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 00:00
Updated-04 Nov, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

Action-Not Available
Vendor-powerdnsnicnlnetlabsthekelleysn/aFedora ProjectInternet Systems Consortium, Inc.Microsoft CorporationRed Hat, Inc.
Product-knot_resolverrecursorenterprise_linuxbindwindows_server_2012windows_server_2008unbounddnsmasqwindows_server_2022windows_server_2022_23h2fedorawindows_server_2019windows_server_2016n/a
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-30194
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.55%
||
7 Day CHG~0.00%
Published-29 Apr, 2025 | 11:25
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service via crafted DoH exchange

When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention.

Action-Not Available
Vendor-PowerDNS
Product-DNSdist
CWE ID-CWE-416
Use After Free
CVE-2026-33597
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-3.7||LOW
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 13:47
Updated-24 Apr, 2026 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PRSD detection denial of service

PRSD detection denial of service

Action-Not Available
Vendor-powerdnsPowerDNS
Product-dnsdistDNSdist
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CVE-2026-33593
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-7.5||HIGH
EPSS-0.02% / 5.91%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 13:48
Updated-24 Apr, 2026 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service via crafted DNSCrypt query

A client can trigger a divide by zero error leading to crash by sending a crafted DNSCrypt query.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-dnsdistDNSdist
CWE ID-CWE-369
Divide By Zero
CVE-2026-33610
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-5.9||MEDIUM
EPSS-0.02% / 4.03%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 14:00
Updated-24 Apr, 2026 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Possible file descriptor exhaustion in forward-dnsupdate

A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-authoritativeAuthoritative
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-27227
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 7.47%
||
7 Day CHG~0.00%
Published-25 Mar, 2022 | 14:41
Updated-03 Aug, 2024 | 05:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers.

Action-Not Available
Vendor-powerdnsn/aFedora Project
Product-authoritative_serverfedorarecursorn/a
CVE-2025-30192
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.98%
||
7 Day CHG~0.00%
Published-21 Jul, 2025 | 12:49
Updated-22 Jul, 2025 | 13:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
A Recursor configured to send out ECS enabled queries can be sensitive to spoofing attempts

An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.

Action-Not Available
Vendor-PowerDNS
Product-Recursor
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-24697
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.13% / 32.07%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 08:23
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.

Action-Not Available
Vendor-powerdnsn/a
Product-authoritativen/a
CVE-2026-24028
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.90%
||
7 Day CHG-0.01%
Published-31 Mar, 2026 | 11:57
Updated-14 Apr, 2026 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds read when parsing DNS packets via Lua

An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-dnsdistDNSdist
CWE ID-CWE-126
Buffer Over-read
CVE-2026-27853
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-5.9||MEDIUM
EPSS-0.01% / 3.03%
||
7 Day CHG-0.01%
Published-31 Mar, 2026 | 12:04
Updated-14 Apr, 2026 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds write when rewriting large DNS packets

An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet might become larger than the initial response and even exceed 65535 bytes, potentially leading to a crash resulting in denial of service.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-dnsdistDNSdist
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-10995
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.49%
||
7 Day CHG~0.00%
Published-19 May, 2020 | 16:04
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect. This is triggered by random subdomains in the NSDNAME in NS records. PowerDNS Recursor 4.1.16, 4.2.2 and 4.3.1 contain a mitigation to limit the impact of this DNS protocol issue.

Action-Not Available
Vendor-powerdnsn/aDebian GNU/LinuxopenSUSEFedora Project
Product-debian_linuxfedorarecursorbackports_sleleapn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2026-27854
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 0.90%
||
7 Day CHG-0.01%
Published-31 Mar, 2026 | 12:06
Updated-14 Apr, 2026 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free when parsing EDNS options in Lua

An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that has been modified, thus triggering a use-after-free and potentially a crash resulting in denial of service.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-dnsdistDNSdist
CWE ID-CWE-416
Use After Free
CVE-2026-24027
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.53%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 14:25
Updated-20 Apr, 2026 | 14:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crafted zones can lead to increased incoming network traffic

Crafted zones can lead to increased incoming network traffic.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-recursorRecursor
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CVE-2026-24030
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.98%
||
7 Day CHG-0.01%
Published-31 Mar, 2026 | 12:01
Updated-14 Apr, 2026 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unbounded memory allocation for DoQ and DoH3

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-dnsdistDNSdist
CWE ID-CWE-789
Memory Allocation with Excessive Size Value
CVE-2024-25590
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-7.5||HIGH
EPSS-0.13% / 31.60%
||
7 Day CHG~0.00%
Published-03 Oct, 2024 | 15:29
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crafted responses can lead to a denial of service due to cache inefficiencies in the Recursor

An attacker can publish a zone containing specific Resource Record Sets. Repeatedly processing and caching results for these sets can lead to a denial of service.

Action-Not Available
Vendor-PowerDNS
Product-Recursor
CWE ID-CWE-20
Improper Input Validation
CVE-2024-25581
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-7.5||HIGH
EPSS-0.01% / 2.66%
||
7 Day CHG~0.00%
Published-13 May, 2024 | 11:49
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Transfer requests received over DoH can lead to a denial of service in DNSdist

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

Action-Not Available
Vendor-PowerDNSpowerdns
Product-DNSdistdnsdist
CWE ID-CWE-20
Improper Input Validation
CVE-2025-59029
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.98%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 09:16
Updated-19 Feb, 2026 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Internal logic flaw in cache management can lead to a denial of service in PowerDNS Recursor

An attacker can trigger an assertion failure by requesting crafted DNS records, waiting for them to be inserted into the records cache, then send a query with qtype set to ANY.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-recursorRecursor
CWE ID-CWE-617
Reachable Assertion
CVE-2025-59030
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-7.5||HIGH
EPSS-0.07% / 20.34%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 09:15
Updated-19 Feb, 2026 | 17:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient validation of incoming notifies over TCP can lead to a denial of service in Recursor

An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-recursorRecursor
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-50868
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-11.80% / 93.74%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 00:00
Updated-23 Dec, 2025 | 20:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

Action-Not Available
Vendor-powerdnsn/aInternet Systems Consortium, Inc.Debian GNU/LinuxRed Hat, Inc.Fedora ProjectNetApp, Inc.
Product-bootstrap_osenterprise_linuxhci_baseboard_management_controllerh410sh300sactive_iq_unified_managerdebian_linuxh700sh410ch500sfedorahci_compute_nodebindrecursorn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2015-5230
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.29% / 52.60%
||
7 Day CHG+0.11%
Published-15 Jan, 2020 | 16:32
Updated-06 Aug, 2024 | 06:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The DNS packet parsing/generation code in PowerDNS (aka pdns) Authoritative Server 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via crafted query packets.

Action-Not Available
Vendor-powerdnsPowerDNSDebian GNU/Linux
Product-debian_linuxauthoritativePowerDNS Authoritative Server
CWE ID-CWE-20
Improper Input Validation
CVE-2021-36754
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-81.34% / 99.17%
||
7 Day CHG~0.00%
Published-27 Jul, 2021 | 05:35
Updated-04 Aug, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception.

Action-Not Available
Vendor-powerdnsn/a
Product-authoritative_servern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2024-25583
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-7.5||HIGH
EPSS-0.01% / 0.87%
||
7 Day CHG~0.00%
Published-25 Apr, 2024 | 09:45
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crafted responses can lead to a denial of service in Recursor if recursive forwarding is configured

A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected.

Action-Not Available
Vendor-PowerDNSpowerdns
Product-Recursorpowerdns
CWE ID-CWE-20
Improper Input Validation
CVE-2020-25829
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.35% / 57.38%
||
7 Day CHG~0.00%
Published-16 Oct, 2020 | 05:07
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).

Action-Not Available
Vendor-powerdnsn/aopenSUSE
Product-recursorbackports_sleleapn/a
CVE-2023-26437
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-3.4||LOW
EPSS-0.01% / 1.16%
||
7 Day CHG~0.00%
Published-04 Apr, 2023 | 14:37
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Deterred spoofing attempts can lead to authoritative servers being marked unavailable

Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.This issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-recursorRecursor
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2023-22617
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.06% / 77.74%
||
7 Day CHG~0.00%
Published-21 Jan, 2023 | 00:00
Updated-03 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote attacker might be able to cause infinite recursion in PowerDNS Recursor 4.8.0 via a DNS query that retrieves DS records for a misconfigured domain, because QName minimization is used in QM fallback mode. This is fixed in 4.8.1.

Action-Not Available
Vendor-powerdnsn/a
Product-recursorn/a
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2019-10162
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-3.5||LOW
EPSS-0.01% / 0.67%
||
7 Day CHG~0.00%
Published-30 Jul, 2019 | 22:15
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.

Action-Not Available
Vendor-powerdnsPowerDNSopenSUSE
Product-authoritativeleappdns
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2025-30193
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.88%
||
7 Day CHG~0.00%
Published-20 May, 2025 | 11:17
Updated-21 May, 2025 | 20:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service via crafted TCP exchange

In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention.

Action-Not Available
Vendor-PowerDNS
Product-DNSdist
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2025-30195
Matching Score-8
Assigner-Open-Xchange
ShareView Details
Matching Score-8
Assigner-Open-Xchange
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.51%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 13:24
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
A crafted zone can lead to an illegal memory access in the PowerDNS Recursor

An attacker can publish a zone containing specific Resource Record Sets. Processing and caching results for these sets can lead to an illegal memory accesses and crash of the Recursor, causing a denial of service. The remedy is: upgrade to the patched 5.2.1 version. We would like to thank Volodymyr Ilyin for bringing this issue to our attention.

Action-Not Available
Vendor-PowerDNS
Product-Recursor
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2019-10163
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.5||LOW
EPSS-0.01% / 0.74%
||
7 Day CHG~0.00%
Published-30 Jul, 2019 | 22:16
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.

Action-Not Available
Vendor-powerdnsPowerDNSopenSUSE
Product-backportsauthoritativeleappdns
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2018-15472
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.64%
||
7 Day CHG~0.00%
Published-15 Apr, 2023 | 00:00
Updated-10 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. The diff formatter using rouge can block for a long time in Sidekiq jobs without any timeout.

Action-Not Available
Vendor-n/aGitLab Inc.
Product-gitlabn/a
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-32030
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.41% / 61.50%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 20:38
Updated-01 Aug, 2025 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apollo Gateway Query Planner Vulnerable to Excessive Resource Consumption via Named Fragment Expansion

Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically during named fragment expansion. Named fragments were being expanded once per fragment spread during query planning, leading to exponential resource usage when deeply nested and reused fragments were involved. This could lead to excessive resource consumption and denial of service. This has been remediated in @apollo/gateway version 2.10.1.

Action-Not Available
Vendor-apollographqlapollographql
Product-apollo_gatewayfederation
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2022-31394
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.35% / 57.38%
||
7 Day CHG~0.00%
Published-21 Feb, 2023 | 00:00
Updated-17 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hyperium Hyper before 0.14.19 does not allow for customization of the max_header_list_size method in the H2 third-party software, allowing attackers to perform HTTP2 attacks.

Action-Not Available
Vendor-hypern/a
Product-hypern/a
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-32374
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.30% / 53.58%
||
7 Day CHG~0.00%
Published-09 Apr, 2025 | 15:14
Updated-26 Aug, 2025 | 00:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Possible Denial of Service (DoS) in DNN.PLATFORM registration

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Possible denial of service with specially crafted information in the public registration form. This vulnerability is fixed in 9.13.8.

Action-Not Available
Vendor-ESW Operations, LLC ("DNN Software")
Product-dotnetnukeDnn.Platform
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-3221
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.43% / 62.90%
||
7 Day CHG~0.00%
Published-21 Jun, 2025 | 12:44
Updated-24 Aug, 2025 | 11:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM InfoSphere Information Server denial of service

IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow a remote attacker to cause a denial of service due to insufficient validation of incoming request resources.

Action-Not Available
Vendor-Linux Kernel Organization, IncIBM CorporationMicrosoft Corporation
Product-windowsinfosphere_information_serverlinux_kernelaixInfoSphere Information Server
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2022-3212
Matching Score-4
Assigner-JFrog
ShareView Details
Matching Score-4
Assigner-JFrog
CVSS Score-7.5||HIGH
EPSS-0.40% / 60.92%
||
7 Day CHG~0.00%
Published-14 Sep, 2022 | 16:05
Updated-03 Aug, 2024 | 01:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DoS in axum-core due to missing request size limit

<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String

Action-Not Available
Vendor-axum-core_projecttokio-rs
Product-axum-coreaxum-core
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2022-23492
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.59% / 69.30%
||
7 Day CHG~0.00%
Published-08 Dec, 2022 | 00:08
Updated-23 Apr, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
go-libp2p denial of service vulnerability from lack of resource management

go-libp2p is the offical libp2p implementation in the Go programming language. Version `0.18.0` and older of go-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. Users are advised to upgrade their version of go-libp2p to version `0.18.1` or newer. Users unable to upgrade may consult the denial of service (dos) mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks.

Action-Not Available
Vendor-protocollibp2p
Product-libp2pgo-libp2p
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2018-12545
Matching Score-4
Assigner-Eclipse Foundation
ShareView Details
Matching Score-4
Assigner-Eclipse Foundation
CVSS Score-7.5||HIGH
EPSS-3.03% / 86.69%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 19:21
Updated-05 Aug, 2024 | 08:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Eclipse Jetty version 9.3.x and 9.4.x, the server is vulnerable to Denial of Service conditions if a remote client sends either large SETTINGs frames container containing many settings, or many small SETTINGs frames. The vulnerability is due to the additional CPU and memory allocations required to handle changed settings.

Action-Not Available
Vendor-Fedora ProjectEclipse Foundation AISBL
Product-fedorajettyEclipse Jetty
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2018-10790
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.56% / 68.33%
||
7 Day CHG~0.00%
Published-25 Aug, 2021 | 13:54
Updated-05 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The AP4_CttsAtom class in Core/Ap4CttsAtom.cpp in Bento4 1.5.1.0 allows remote attackers to cause a denial of service (application crash), related to a memory allocation failure, as demonstrated by mp2aac.

Action-Not Available
Vendor-n/aAxiomatic Systems, LLC
Product-bento4n/a
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-5438
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.09%
||
7 Day CHG~0.00%
Published-09 Apr, 2026 | 14:44
Updated-15 Apr, 2026 | 19:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gzip Decompression Bomb via Content-Encoding Header

A gzip decompression bomb vulnerability exists when Orthanc processes HTTP request with `Content-Encoding: gzip`. The server does not enforce limits on decompressed size and allocates memory based on attacker-controlled compression metadata. A specially crafted gzip payload can trigger excessive memory allocation and exhaust system memory.

Action-Not Available
Vendor-orthanc-serverOrthanc
Product-orthancDICOM Server
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-5440
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-1.64% / 82.00%
||
7 Day CHG~0.00%
Published-09 Apr, 2026 | 14:43
Updated-14 Apr, 2026 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Memory Exhaustion via Unbounded Content-Length

A memory exhaustion vulnerability exists in the HTTP server due to unbounded use of the `Content-Length` header. The server allocates memory directly based on the attacker supplied header value without enforcing an upper limit. A crafted HTTP request containing an extremely large `Content-Length` value can trigger excessive memory allocation and server termination, even without sending a request body.

Action-Not Available
Vendor-orthanc-serverOrthanc
Product-orthancDICOM Server
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-5439
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.09%
||
7 Day CHG~0.00%
Published-09 Apr, 2026 | 14:44
Updated-15 Apr, 2026 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Memory Exhaustion via Forged ZIP Metadata

A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An attacker can craft a small ZIP archive containing a forged size value, causing the server to allocate extremely large buffers during extraction.

Action-Not Available
Vendor-orthanc-serverOrthanc
Product-orthancDICOM Server
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-32380
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.53% / 67.38%
||
7 Day CHG~0.00%
Published-09 Apr, 2025 | 16:05
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apollo Router Query Validation Vulnerable to Excessive Resource Consumption via Named Fragment Processing

The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router's usage of Apollo Compiler allowed queries with deeply nested and reused named fragments to be prohibitively expensive to validate. This could lead to excessive resource consumption and denial of service. Apollo Router's usage of Apollo Compiler has been updated so that validation logic processes each named fragment only once, preventing redundant traversal. This has been remediated in apollo-router versions 1.61.2 and 2.1.1.

Action-Not Available
Vendor-apollographql
Product-router
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2022-30522
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-11.59% / 93.68%
||
7 Day CHG~0.00%
Published-08 Jun, 2022 | 10:00
Updated-03 Aug, 2024 | 06:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
mod_sed denial of service

If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.

Action-Not Available
Vendor-NetApp, Inc.The Apache Software FoundationFedora Project
Product-http_serverclustered_data_ontapfedoraApache HTTP Server
CWE ID-CWE-789
Memory Allocation with Excessive Size Value
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 15
  • 16
  • Next
Details not found