Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2006-2077

Buffer overflow in Paul Rombouts pdnsd before 1.2.4 has unknown impact and attack vectors. NOTE: this issue might be related to the OUSPG PROTOS DNS test suite.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.021
EPSS Ranking 83.1%
CVSS Severity
CVSS v2 Score 10.0
Products affected by CVE-2006-2077
  • Pdnsd » Pdnsd » Version: 1.0.13
    cpe:2.3:a:pdnsd:pdnsd:1.0.13
  • Pdnsd » Pdnsd » Version: 1.0.15
    cpe:2.3:a:pdnsd:pdnsd:1.0.15
  • Pdnsd » Pdnsd » Version: 1.1
    cpe:2.3:a:pdnsd:pdnsd:1.1
  • Pdnsd » Pdnsd » Version: 1.1.1
    cpe:2.3:a:pdnsd:pdnsd:1.1.1
  • Pdnsd » Pdnsd » Version: 1.1.10_par
    cpe:2.3:a:pdnsd:pdnsd:1.1.10_par
  • Pdnsd » Pdnsd » Version: 1.1.11_par
    cpe:2.3:a:pdnsd:pdnsd:1.1.11_par
  • Pdnsd » Pdnsd » Version: 1.1.2
    cpe:2.3:a:pdnsd:pdnsd:1.1.2
  • Pdnsd » Pdnsd » Version: 1.1.3
    cpe:2.3:a:pdnsd:pdnsd:1.1.3
  • Pdnsd » Pdnsd » Version: 1.1.4
    cpe:2.3:a:pdnsd:pdnsd:1.1.4
  • Pdnsd » Pdnsd » Version: 1.1.5
    cpe:2.3:a:pdnsd:pdnsd:1.1.5
  • Pdnsd » Pdnsd » Version: 1.1.6
    cpe:2.3:a:pdnsd:pdnsd:1.1.6
  • Pdnsd » Pdnsd » Version: 1.1.7a
    cpe:2.3:a:pdnsd:pdnsd:1.1.7a
  • Pdnsd » Pdnsd » Version: 1.1.8b1_par5
    cpe:2.3:a:pdnsd:pdnsd:1.1.8b1_par5
  • Pdnsd » Pdnsd » Version: 1.1.8b1_par6
    cpe:2.3:a:pdnsd:pdnsd:1.1.8b1_par6
  • Pdnsd » Pdnsd » Version: 1.1.8b1_par8
    cpe:2.3:a:pdnsd:pdnsd:1.1.8b1_par8
  • Pdnsd » Pdnsd » Version: 1.2.1_par
    cpe:2.3:a:pdnsd:pdnsd:1.2.1_par
  • Pdnsd » Pdnsd » Version: 1.2.2_par
    cpe:2.3:a:pdnsd:pdnsd:1.2.2_par
  • Pdnsd » Pdnsd » Version: 1.2.3_par
    cpe:2.3:a:pdnsd:pdnsd:1.2.3_par


Contact Us

Shodan ® - All rights reserved