Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1055203?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1055203?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1", "type": "deb", "namespace": "debian", "name": "pdns-recursor", "version": "5.2.8-0+deb13u1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "5.4.1-1", "latest_non_vulnerable_version": "5.4.1-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353735?format=api", "vulnerability_id": "VCID-26wf-1bqp-sbff", "summary": "If you use the zoneToCache function with a malicious authoritative server, an attacker can send a zone that result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33601", "reference_id": "", "reference_type": "", "scores": [ { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00174", "published_at": "2026-04-26T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00212", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33601" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html", "reference_id": "powerdns-advisory-powerdns-2026-03.html", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:52:54Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077808?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.4.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.1-1" } ], "aliases": [ "CVE-2026-33601" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26wf-1bqp-sbff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353748?format=api", "vulnerability_id": "VCID-5afe-ws96-nqh9", "summary": "By publishing and querying a crafted zone an attacker can cause allocation of large entries in the negative and aggressive NSEC(3) caches.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33258", "reference_id": "", "reference_type": "", "scores": [ { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00082", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33258", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33258" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html", "reference_id": "powerdns-advisory-powerdns-2026-03.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:49Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077808?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.4.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.1-1" } ], "aliases": [ "CVE-2026-33258" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5afe-ws96-nqh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353734?format=api", "vulnerability_id": "VCID-anab-r9ty-1yh1", "summary": "An RPZ sent by a malicious authoritative server can result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04891", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04927", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33600" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html", "reference_id": "powerdns-advisory-powerdns-2026-03.html", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:52:53Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077808?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.4.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.1-1" } ], "aliases": [ "CVE-2026-33600" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-anab-r9ty-1yh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353753?format=api", "vulnerability_id": "VCID-chzq-qej6-rkdq", "summary": "An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33257", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00992", "published_at": "2026-04-26T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00988", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33257" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33257", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33257" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html", "reference_id": "powerdns-advisory-2026-05.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:48Z/" } ], "url": "https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html" }, { "reference_url": "https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html", "reference_id": "powerdns-advisory-for-dnsdist-2026-04.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:48Z/" } ], "url": "https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html", "reference_id": "powerdns-advisory-powerdns-2026-03.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:48Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077797?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.4.0-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-26wf-1bqp-sbff" }, { "vulnerability": "VCID-5afe-ws96-nqh9" }, { "vulnerability": "VCID-anab-r9ty-1yh1" }, { "vulnerability": "VCID-k3re-ss39-zugm" }, { "vulnerability": "VCID-mzne-k7ry-pubm" }, { "vulnerability": "VCID-v9yz-hcqv-83gu" }, { "vulnerability": "VCID-xasd-r2rc-2ufq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.0-1" } ], "aliases": [ "CVE-2026-33257" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-chzq-qej6-rkdq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354131?format=api", "vulnerability_id": "VCID-k3re-ss39-zugm", "summary": "An attacker can send replies that result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service. Cookies are disabled by default.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33262", "reference_id": "", "reference_type": "", "scores": [ { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00196", "published_at": "2026-04-26T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00247", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33262" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33262", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33262" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html", "reference_id": "powerdns-advisory-powerdns-2026-03.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:52:58Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077808?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.4.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.1-1" } ], "aliases": [ "CVE-2026-33262" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k3re-ss39-zugm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353747?format=api", "vulnerability_id": "VCID-mzne-k7ry-pubm", "summary": "Having many concurrent transfers of the same RPZ can lead to inconsistent RPZ data, use after free and/or a crash of the recursor. Normally concurrent transfers of the same RPZ zone can only occur with a malfunctioning RPZ provider.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33259", "reference_id": "", "reference_type": "", "scores": [ { "value": "2e-05", "scoring_system": "epss", "scoring_elements": "0.00038", "published_at": "2026-04-24T12:55:00Z" }, { "value": "2e-05", "scoring_system": "epss", "scoring_elements": "0.00028", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33259" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33259", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33259" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html", "reference_id": "powerdns-advisory-powerdns-2026-03.html", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:52:55Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077808?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.4.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.1-1" } ], "aliases": [ "CVE-2026-33259" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mzne-k7ry-pubm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353751?format=api", "vulnerability_id": "VCID-pfhu-1qdf-p7d5", "summary": "An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33260", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00992", "published_at": "2026-04-26T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00988", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33260" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html", "reference_id": "powerdns-advisory-2026-05.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:50Z/" } ], "url": "https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html" }, { "reference_url": "https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html", "reference_id": "powerdns-advisory-for-dnsdist-2026-04.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:50Z/" } ], "url": "https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html", "reference_id": "powerdns-advisory-powerdns-2026-03.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:50Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077797?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.4.0-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-26wf-1bqp-sbff" }, { "vulnerability": "VCID-5afe-ws96-nqh9" }, { "vulnerability": "VCID-anab-r9ty-1yh1" }, { "vulnerability": "VCID-k3re-ss39-zugm" }, { "vulnerability": "VCID-mzne-k7ry-pubm" }, { "vulnerability": "VCID-v9yz-hcqv-83gu" }, { "vulnerability": "VCID-xasd-r2rc-2ufq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.0-1" } ], "aliases": [ "CVE-2026-33260" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pfhu-1qdf-p7d5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353737?format=api", "vulnerability_id": "VCID-v9yz-hcqv-83gu", "summary": "A zone transition from NSEC to NSEC3 might trigger an internal inconsistency and cause a denial of service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33261", "reference_id": "", "reference_type": "", "scores": [ { "value": "2e-05", "scoring_system": "epss", "scoring_elements": "0.00049", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33261" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html", "reference_id": "powerdns-advisory-powerdns-2026-03.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:52:56Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077808?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.4.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.1-1" } ], "aliases": [ "CVE-2026-33261" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v9yz-hcqv-83gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353738?format=api", "vulnerability_id": "VCID-xasd-r2rc-2ufq", "summary": "An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33256", "reference_id": "", "reference_type": "", "scores": [ { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00083", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33256" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html", "reference_id": "powerdns-advisory-powerdns-2026-03.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:46Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077808?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.4.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.1-1" } ], "aliases": [ "CVE-2026-33256" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xasd-r2rc-2ufq" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96817?format=api", "vulnerability_id": "VCID-2ugc-uygs-hqb8", "summary": "Crafted delegations or IP fragments can poison cached delegations in Recursor.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59024", "reference_id": "", "reference_type": "", "scores": [ { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00074", "published_at": "2026-04-26T12:55:00Z" }, { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00072", "published_at": "2026-04-21T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00204", "published_at": "2026-04-11T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00203", "published_at": "2026-04-13T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00236", "published_at": "2026-04-18T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00202", "published_at": "2026-04-09T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00205", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59024" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118751", "reference_id": "1118751", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118751" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html", "reference_id": "powerdns-advisory-2025-06.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-09T16:11:42Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1055203?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-26wf-1bqp-sbff" }, { "vulnerability": "VCID-5afe-ws96-nqh9" }, { "vulnerability": "VCID-anab-r9ty-1yh1" }, { "vulnerability": "VCID-chzq-qej6-rkdq" }, { "vulnerability": "VCID-k3re-ss39-zugm" }, { "vulnerability": "VCID-mzne-k7ry-pubm" }, { "vulnerability": "VCID-pfhu-1qdf-p7d5" }, { "vulnerability": "VCID-v9yz-hcqv-83gu" }, { "vulnerability": "VCID-xasd-r2rc-2ufq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-59024" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ugc-uygs-hqb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96816?format=api", "vulnerability_id": "VCID-cdzz-8tc8-jucu", "summary": "Crafted delegations or IP fragments can poison cached delegations in Recursor.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59023", "reference_id": "", "reference_type": "", "scores": [ { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00365", "published_at": "2026-04-02T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00356", "published_at": "2026-04-07T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00353", "published_at": "2026-04-09T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.0035", "published_at": "2026-04-11T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00347", "published_at": "2026-04-12T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00345", "published_at": "2026-04-13T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.0034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00368", "published_at": "2026-04-04T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00487", "published_at": "2026-04-21T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00485", "published_at": "2026-04-24T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00486", "published_at": "2026-04-26T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00428", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59023" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118751", "reference_id": "1118751", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118751" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html", "reference_id": "powerdns-advisory-2025-06.html", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T16:17:14Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1055203?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-26wf-1bqp-sbff" }, { "vulnerability": "VCID-5afe-ws96-nqh9" }, { "vulnerability": "VCID-anab-r9ty-1yh1" }, { "vulnerability": "VCID-chzq-qej6-rkdq" }, { "vulnerability": "VCID-k3re-ss39-zugm" }, { "vulnerability": "VCID-mzne-k7ry-pubm" }, { "vulnerability": "VCID-pfhu-1qdf-p7d5" }, { "vulnerability": "VCID-v9yz-hcqv-83gu" }, { "vulnerability": "VCID-xasd-r2rc-2ufq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-59023" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cdzz-8tc8-jucu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96980?format=api", "vulnerability_id": "VCID-m445-c6a1-uugf", "summary": "Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0398", "reference_id": "", "reference_type": "", "scores": [ { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00281", "published_at": "2026-04-26T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00282", "published_at": "2026-04-24T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00208", "published_at": "2026-04-02T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00209", "published_at": "2026-04-16T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00206", "published_at": "2026-04-13T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00205", "published_at": "2026-04-09T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00244", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0398" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490", "reference_id": "1127490", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html", "reference_id": "powerdns-advisory-2026-01.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:36:48Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1055203?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-26wf-1bqp-sbff" }, { "vulnerability": "VCID-5afe-ws96-nqh9" }, { "vulnerability": "VCID-anab-r9ty-1yh1" }, { "vulnerability": "VCID-chzq-qej6-rkdq" }, { "vulnerability": "VCID-k3re-ss39-zugm" }, { "vulnerability": "VCID-mzne-k7ry-pubm" }, { "vulnerability": "VCID-pfhu-1qdf-p7d5" }, { "vulnerability": "VCID-v9yz-hcqv-83gu" }, { "vulnerability": "VCID-xasd-r2rc-2ufq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-0398" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m445-c6a1-uugf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97020?format=api", "vulnerability_id": "VCID-pjbp-1jgm-s3cg", "summary": "Crafted zones can lead to increased incoming network traffic.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-24027", "reference_id": "", "reference_type": "", "scores": [ { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00325", "published_at": "2026-04-11T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00324", "published_at": "2026-04-12T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00323", "published_at": "2026-04-13T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00318", "published_at": "2026-04-16T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00402", "published_at": "2026-04-18T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00329", "published_at": "2026-04-07T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00326", "published_at": "2026-04-08T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00327", "published_at": "2026-04-09T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.0053", "published_at": "2026-04-21T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00527", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-24027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24027" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490", "reference_id": "1127490", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html", "reference_id": "powerdns-advisory-2026-01.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T16:19:10Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1055203?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-26wf-1bqp-sbff" }, { "vulnerability": "VCID-5afe-ws96-nqh9" }, { "vulnerability": "VCID-anab-r9ty-1yh1" }, { "vulnerability": "VCID-chzq-qej6-rkdq" }, { "vulnerability": "VCID-k3re-ss39-zugm" }, { "vulnerability": "VCID-mzne-k7ry-pubm" }, { "vulnerability": "VCID-pfhu-1qdf-p7d5" }, { "vulnerability": "VCID-v9yz-hcqv-83gu" }, { "vulnerability": "VCID-xasd-r2rc-2ufq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-24027" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pjbp-1jgm-s3cg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96818?format=api", "vulnerability_id": "VCID-umcq-ztbz-qfb2", "summary": "An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59030", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19561", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19424", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19416", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19454", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19513", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20341", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.2047", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20346", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24816", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24659", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.2459", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59030" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122197", "reference_id": "1122197", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122197" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-08.html", "reference_id": "powerdns-advisory-2025-08.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T14:30:11Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1055203?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-26wf-1bqp-sbff" }, { "vulnerability": "VCID-5afe-ws96-nqh9" }, { "vulnerability": "VCID-anab-r9ty-1yh1" }, { "vulnerability": "VCID-chzq-qej6-rkdq" }, { "vulnerability": "VCID-k3re-ss39-zugm" }, { "vulnerability": "VCID-mzne-k7ry-pubm" }, { "vulnerability": "VCID-pfhu-1qdf-p7d5" }, { "vulnerability": "VCID-v9yz-hcqv-83gu" }, { "vulnerability": "VCID-xasd-r2rc-2ufq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-59030" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-umcq-ztbz-qfb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96620?format=api", "vulnerability_id": "VCID-wywf-pmyt-zud4", "summary": "An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30192", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09742", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13434", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13327", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1341", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1346", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13399", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13352", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14876", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14977", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14882", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14936", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14975", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30192" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109808", "reference_id": "1109808", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109808" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html", "reference_id": "powerdns-advisory-2025-04.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-21T13:05:23Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1055203?format=api", "purl": "pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-26wf-1bqp-sbff" }, { "vulnerability": "VCID-5afe-ws96-nqh9" }, { "vulnerability": "VCID-anab-r9ty-1yh1" }, { "vulnerability": "VCID-chzq-qej6-rkdq" }, { "vulnerability": "VCID-k3re-ss39-zugm" }, { "vulnerability": "VCID-mzne-k7ry-pubm" }, { "vulnerability": "VCID-pfhu-1qdf-p7d5" }, { "vulnerability": "VCID-v9yz-hcqv-83gu" }, { "vulnerability": "VCID-xasd-r2rc-2ufq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-30192" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wywf-pmyt-zud4" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1" }