Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/adns@1.5.0~rc1-1
Typedeb
Namespacedebian
Nameadns
Version1.5.0~rc1-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.6.0-2
Latest_non_vulnerable_version1.6.0-2
Affected_by_vulnerabilities
0
url VCID-4b8y-aqh2-9fe8
vulnerability_id VCID-4b8y-aqh2-9fe8
summary An issue was discovered in adns before 1.5.2. It overruns reading a buffer if a domain ends with backslash. If the query domain ended with \, and adns_qf_quoteok_query was specified, qdparselabel would read additional bytes from the buffer and try to treat them as the escape sequence. It would depart the input buffer and start processing many bytes of arbitrary heap data as if it were the query domain. Eventually it would run out of input or find some other kind of error, and declare the query domain invalid. But before then it might outrun available memory and crash. In principle this could be a denial of service attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9107
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67154
published_at 2026-04-21T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67054
published_at 2026-04-01T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67091
published_at 2026-04-02T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67115
published_at 2026-04-04T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.6709
published_at 2026-04-07T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67139
published_at 2026-04-08T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67152
published_at 2026-04-09T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67171
published_at 2026-04-11T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67157
published_at 2026-04-12T12:55:00Z
9
value 0.00527
scoring_system epss
scoring_elements 0.67126
published_at 2026-04-13T12:55:00Z
10
value 0.00527
scoring_system epss
scoring_elements 0.67159
published_at 2026-04-16T12:55:00Z
11
value 0.00527
scoring_system epss
scoring_elements 0.67173
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9107
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9107
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9107
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4b8y-aqh2-9fe8
1
url VCID-5zre-ud6f-ckfe
vulnerability_id VCID-5zre-ud6f-ckfe
summary An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9103
reference_id
reference_type
scores
0
value 0.00674
scoring_system epss
scoring_elements 0.7143
published_at 2026-04-21T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71355
published_at 2026-04-01T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71363
published_at 2026-04-02T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71381
published_at 2026-04-04T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71356
published_at 2026-04-07T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.71397
published_at 2026-04-08T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71409
published_at 2026-04-09T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.71432
published_at 2026-04-11T12:55:00Z
8
value 0.00674
scoring_system epss
scoring_elements 0.71417
published_at 2026-04-12T12:55:00Z
9
value 0.00674
scoring_system epss
scoring_elements 0.71399
published_at 2026-04-13T12:55:00Z
10
value 0.00674
scoring_system epss
scoring_elements 0.71445
published_at 2026-04-16T12:55:00Z
11
value 0.00674
scoring_system epss
scoring_elements 0.7145
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9103
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9103
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9103
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zre-ud6f-ckfe
2
url VCID-6yhs-39tq-e3hc
vulnerability_id VCID-6yhs-39tq-e3hc
summary An issue was discovered in adns before 1.5.2. adns_rr_info mishandles a bogus *datap. The general pattern for formatting integers is to sprintf into a fixed-size buffer. This is correct if the input is in the right range; if it isn't, the buffer may be overrun (depending on the sizes of the types on the current platform). Of course the inputs ought to be right. And there are pointers in there too, so perhaps one could say that the caller ought to check these things. It may be better to require the caller to make the pointer structure right, but to have the code here be defensive about (and tolerate with an error but without crashing) out-of-range integer values. So: it should defend each of these integer conversion sites with a check for the actual permitted range, and return adns_s_invaliddata if not. The lack of this check causes the SOA sign extension bug to be a serious security problem: the sign extended SOA value is out of range, and overruns the buffer when reconverted. This is related to sign extending SOA 32-bit integer fields, and use of a signed data type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9106
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67154
published_at 2026-04-21T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67054
published_at 2026-04-01T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67091
published_at 2026-04-02T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67115
published_at 2026-04-04T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.6709
published_at 2026-04-07T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67139
published_at 2026-04-08T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67152
published_at 2026-04-09T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67171
published_at 2026-04-11T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67157
published_at 2026-04-12T12:55:00Z
9
value 0.00527
scoring_system epss
scoring_elements 0.67126
published_at 2026-04-13T12:55:00Z
10
value 0.00527
scoring_system epss
scoring_elements 0.67159
published_at 2026-04-16T12:55:00Z
11
value 0.00527
scoring_system epss
scoring_elements 0.67173
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9106
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9106
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9106
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yhs-39tq-e3hc
3
url VCID-j4d3-qrnw-gbd2
vulnerability_id VCID-j4d3-qrnw-gbd2
summary An issue was discovered in adns before 1.5.2. It corrupts a pointer when a nameserver speaks first because of a wrong number of pointer dereferences. This bug may well be exploitable as a remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9105
reference_id
reference_type
scores
0
value 0.03207
scoring_system epss
scoring_elements 0.87034
published_at 2026-04-21T12:55:00Z
1
value 0.03207
scoring_system epss
scoring_elements 0.86965
published_at 2026-04-01T12:55:00Z
2
value 0.03207
scoring_system epss
scoring_elements 0.86975
published_at 2026-04-02T12:55:00Z
3
value 0.03207
scoring_system epss
scoring_elements 0.86994
published_at 2026-04-04T12:55:00Z
4
value 0.03207
scoring_system epss
scoring_elements 0.86987
published_at 2026-04-07T12:55:00Z
5
value 0.03207
scoring_system epss
scoring_elements 0.87007
published_at 2026-04-08T12:55:00Z
6
value 0.03207
scoring_system epss
scoring_elements 0.87014
published_at 2026-04-09T12:55:00Z
7
value 0.03207
scoring_system epss
scoring_elements 0.87028
published_at 2026-04-11T12:55:00Z
8
value 0.03207
scoring_system epss
scoring_elements 0.87022
published_at 2026-04-12T12:55:00Z
9
value 0.03207
scoring_system epss
scoring_elements 0.87016
published_at 2026-04-13T12:55:00Z
10
value 0.03207
scoring_system epss
scoring_elements 0.87032
published_at 2026-04-16T12:55:00Z
11
value 0.03207
scoring_system epss
scoring_elements 0.87037
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9105
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9105
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9105
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4d3-qrnw-gbd2
4
url VCID-j7dr-cbuk-tkgp
vulnerability_id VCID-j7dr-cbuk-tkgp
summary An issue was discovered in adns before 1.5.2. It fails to ignore apparent answers before the first RR that was found the first time. when this is fixed, the second answer scan finds the same RRs at the first. Otherwise, adns can be confused by interleaving answers for the CNAME target, with the CNAME itself. In that case the answer data structure (on the heap) can be overrun. With this fixed, it prefers to look only at the answer RRs which come after the CNAME, which is at least arguably correct.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9109
reference_id
reference_type
scores
0
value 0.0067
scoring_system epss
scoring_elements 0.71352
published_at 2026-04-21T12:55:00Z
1
value 0.0067
scoring_system epss
scoring_elements 0.71274
published_at 2026-04-07T12:55:00Z
2
value 0.0067
scoring_system epss
scoring_elements 0.71282
published_at 2026-04-02T12:55:00Z
3
value 0.0067
scoring_system epss
scoring_elements 0.71299
published_at 2026-04-04T12:55:00Z
4
value 0.0067
scoring_system epss
scoring_elements 0.71315
published_at 2026-04-08T12:55:00Z
5
value 0.0067
scoring_system epss
scoring_elements 0.71329
published_at 2026-04-09T12:55:00Z
6
value 0.0067
scoring_system epss
scoring_elements 0.71351
published_at 2026-04-11T12:55:00Z
7
value 0.0067
scoring_system epss
scoring_elements 0.71336
published_at 2026-04-12T12:55:00Z
8
value 0.0067
scoring_system epss
scoring_elements 0.71319
published_at 2026-04-13T12:55:00Z
9
value 0.0067
scoring_system epss
scoring_elements 0.71366
published_at 2026-04-16T12:55:00Z
10
value 0.0067
scoring_system epss
scoring_elements 0.71372
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9109
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9109
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9109
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7dr-cbuk-tkgp
5
url VCID-j7qp-xbgk-h7c6
vulnerability_id VCID-j7qp-xbgk-h7c6
summary An issue was discovered in adns before 1.5.2. It hangs, eating CPU, if a compression pointer loop is encountered.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9104
reference_id
reference_type
scores
0
value 0.0067
scoring_system epss
scoring_elements 0.71352
published_at 2026-04-21T12:55:00Z
1
value 0.0067
scoring_system epss
scoring_elements 0.71274
published_at 2026-04-07T12:55:00Z
2
value 0.0067
scoring_system epss
scoring_elements 0.71282
published_at 2026-04-02T12:55:00Z
3
value 0.0067
scoring_system epss
scoring_elements 0.71299
published_at 2026-04-04T12:55:00Z
4
value 0.0067
scoring_system epss
scoring_elements 0.71315
published_at 2026-04-08T12:55:00Z
5
value 0.0067
scoring_system epss
scoring_elements 0.71329
published_at 2026-04-09T12:55:00Z
6
value 0.0067
scoring_system epss
scoring_elements 0.71351
published_at 2026-04-11T12:55:00Z
7
value 0.0067
scoring_system epss
scoring_elements 0.71336
published_at 2026-04-12T12:55:00Z
8
value 0.0067
scoring_system epss
scoring_elements 0.71319
published_at 2026-04-13T12:55:00Z
9
value 0.0067
scoring_system epss
scoring_elements 0.71366
published_at 2026-04-16T12:55:00Z
10
value 0.0067
scoring_system epss
scoring_elements 0.71372
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9104
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9104
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9104
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7qp-xbgk-h7c6
6
url VCID-q5km-d9qe-pfbu
vulnerability_id VCID-q5km-d9qe-pfbu
summary An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() would have done. Without this fix, adnshost may read and process one byte beyond the buffer, perhaps crashing or perhaps somehow leaking the value of that byte.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9108
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67154
published_at 2026-04-21T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67054
published_at 2026-04-01T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67091
published_at 2026-04-02T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67115
published_at 2026-04-04T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.6709
published_at 2026-04-07T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67139
published_at 2026-04-08T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67152
published_at 2026-04-09T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67171
published_at 2026-04-11T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67157
published_at 2026-04-12T12:55:00Z
9
value 0.00527
scoring_system epss
scoring_elements 0.67126
published_at 2026-04-13T12:55:00Z
10
value 0.00527
scoring_system epss
scoring_elements 0.67159
published_at 2026-04-16T12:55:00Z
11
value 0.00527
scoring_system epss
scoring_elements 0.67173
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9108
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9108
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9108
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5km-d9qe-pfbu
Fixing_vulnerabilities
Risk_score1.9
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.5.0~rc1-1