Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
Typedeb
Namespacedebian
Namepdns-recursor
Version5.2.8-0+deb13u1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2ugc-uygs-hqb8
vulnerability_id VCID-2ugc-uygs-hqb8
summary Crafted delegations or IP fragments can poison cached delegations in Recursor.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59024
reference_id
reference_type
scores
0
value 3e-05
scoring_system epss
scoring_elements 0.00072
published_at 2026-04-21T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00202
published_at 2026-04-09T12:55:00Z
2
value 5e-05
scoring_system epss
scoring_elements 0.00203
published_at 2026-04-13T12:55:00Z
3
value 5e-05
scoring_system epss
scoring_elements 0.00236
published_at 2026-04-18T12:55:00Z
4
value 5e-05
scoring_system epss
scoring_elements 0.00205
published_at 2026-04-16T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.00204
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59024
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59024
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118751
reference_id 1118751
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118751
3
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html
reference_id powerdns-advisory-2025-06.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-09T16:11:42Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html
fixed_packages
0
url pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
purl pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1
aliases CVE-2025-59024
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ugc-uygs-hqb8
1
url VCID-cdzz-8tc8-jucu
vulnerability_id VCID-cdzz-8tc8-jucu
summary Crafted delegations or IP fragments can poison cached delegations in Recursor.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59023
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00365
published_at 2026-04-02T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.0035
published_at 2026-04-11T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00347
published_at 2026-04-12T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00345
published_at 2026-04-13T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.0034
published_at 2026-04-16T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00368
published_at 2026-04-04T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00356
published_at 2026-04-07T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00353
published_at 2026-04-09T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00487
published_at 2026-04-21T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.00428
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59023
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59023
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118751
reference_id 1118751
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118751
3
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html
reference_id powerdns-advisory-2025-06.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T16:17:14Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html
fixed_packages
0
url pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
purl pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1
aliases CVE-2025-59023
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cdzz-8tc8-jucu
2
url VCID-m445-c6a1-uugf
vulnerability_id VCID-m445-c6a1-uugf
summary Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0398
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00282
published_at 2026-04-21T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00244
published_at 2026-04-18T12:55:00Z
2
value 5e-05
scoring_system epss
scoring_elements 0.00208
published_at 2026-04-02T12:55:00Z
3
value 5e-05
scoring_system epss
scoring_elements 0.00209
published_at 2026-04-16T12:55:00Z
4
value 5e-05
scoring_system epss
scoring_elements 0.00206
published_at 2026-04-13T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.00205
published_at 2026-04-09T12:55:00Z
6
value 5e-05
scoring_system epss
scoring_elements 0.00207
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0398
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0398
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490
reference_id 1127490
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490
3
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html
reference_id powerdns-advisory-2026-01.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:36:48Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html
fixed_packages
0
url pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
purl pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1
aliases CVE-2026-0398
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m445-c6a1-uugf
3
url VCID-pjbp-1jgm-s3cg
vulnerability_id VCID-pjbp-1jgm-s3cg
summary Crafted zones can lead to increased incoming network traffic.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-24027
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00339
published_at 2026-04-02T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00323
published_at 2026-04-13T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00318
published_at 2026-04-16T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00402
published_at 2026-04-18T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00337
published_at 2026-04-04T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00329
published_at 2026-04-07T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00326
published_at 2026-04-08T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00327
published_at 2026-04-09T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00325
published_at 2026-04-11T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00324
published_at 2026-04-12T12:55:00Z
10
value 7e-05
scoring_system epss
scoring_elements 0.0053
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-24027
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24027
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490
reference_id 1127490
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490
3
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html
reference_id powerdns-advisory-2026-01.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T16:19:10Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html
fixed_packages
0
url pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
purl pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1
aliases CVE-2026-24027
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pjbp-1jgm-s3cg
4
url VCID-umcq-ztbz-qfb2
vulnerability_id VCID-umcq-ztbz-qfb2
summary An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59030
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19416
published_at 2026-04-16T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19561
published_at 2026-04-11T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19513
published_at 2026-04-12T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19454
published_at 2026-04-13T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19424
published_at 2026-04-18T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.2047
published_at 2026-04-21T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24706
published_at 2026-04-09T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24777
published_at 2026-04-02T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24816
published_at 2026-04-04T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.2459
published_at 2026-04-07T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24659
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59030
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59030
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122197
reference_id 1122197
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122197
4
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-08.html
reference_id powerdns-advisory-2025-08.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T14:30:11Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-08.html
fixed_packages
0
url pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
purl pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1
aliases CVE-2025-59030
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umcq-ztbz-qfb2
5
url VCID-wywf-pmyt-zud4
vulnerability_id VCID-wywf-pmyt-zud4
summary An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30192
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09742
published_at 2026-04-04T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09691
published_at 2026-04-02T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.1346
published_at 2026-04-09T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13327
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.1341
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13434
published_at 2026-04-11T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13399
published_at 2026-04-12T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13352
published_at 2026-04-13T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14882
published_at 2026-04-18T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14936
published_at 2026-04-21T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14876
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30192
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30192
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109808
reference_id 1109808
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109808
3
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html
reference_id powerdns-advisory-2025-04.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-21T13:05:23Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html
fixed_packages
0
url pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
purl pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1
aliases CVE-2025-30192
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wywf-pmyt-zud4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1