Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Namednsdist
Version2.0.1-r0
Qualifiers
arch ppc64le
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4d91-y27h-vyft
vulnerability_id VCID-4d91-y27h-vyft
summary In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30187
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01107
published_at 2026-04-11T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01094
published_at 2026-04-02T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01103
published_at 2026-04-13T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01101
published_at 2026-04-12T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01112
published_at 2026-04-04T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01118
published_at 2026-04-07T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01123
published_at 2026-04-08T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01124
published_at 2026-04-09T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01331
published_at 2026-04-21T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01261
published_at 2026-04-16T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01274
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30187
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1115643
reference_id 1115643
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1115643
3
reference_url https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-05.html
reference_id powerdns-advisory-for-dnsdist-2025-05.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-18T13:38:54Z/
url https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-05.html
4
reference_url https://usn.ubuntu.com/8037-1/
reference_id USN-8037-1
reference_type
scores
url https://usn.ubuntu.com/8037-1/
fixed_packages
0
url pkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-30187
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4d91-y27h-vyft
1
url VCID-cmeu-b3fh-hkaf
vulnerability_id VCID-cmeu-b3fh-hkaf
summary upstream:
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8671.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-8671
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67555
published_at 2026-04-08T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.67503
published_at 2026-04-07T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67579
published_at 2026-04-16T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67544
published_at 2026-04-13T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67577
published_at 2026-04-12T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67591
published_at 2026-04-11T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67568
published_at 2026-04-09T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.67525
published_at 2026-04-04T12:55:00Z
8
value 0.00589
scoring_system epss
scoring_elements 0.69192
published_at 2026-04-21T12:55:00Z
9
value 0.00589
scoring_system epss
scoring_elements 0.69213
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-8671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8671
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2388222
reference_id 2388222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2388222
5
reference_url https://www.fastlystatus.com/incident/377810
reference_id 377810
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/
url https://www.fastlystatus.com/incident/377810
6
reference_url https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80
reference_id 4729b661e3c6654198d2cc62997e1af58bef4b80
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/
url https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80
7
reference_url https://gitlab.isc.org/isc-projects/bind9/-/issues/5325
reference_id 5325
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/
url https://gitlab.isc.org/isc-projects/bind9/-/issues/5325
8
reference_url https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq
reference_id GHSA-mrjm-qq9m-9mjq
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/
url https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq
9
reference_url https://www.suse.com/support/kb/doc/?id=000021980
reference_id ?id=000021980
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/
url https://www.suse.com/support/kb/doc/?id=000021980
10
reference_url https://support2.windriver.com/index.php?page=security-notices
reference_id index.php?page=security-notices
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/
url https://support2.windriver.com/index.php?page=security-notices
11
reference_url https://galbarnahum.com/made-you-reset
reference_id made-you-reset
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/
url https://galbarnahum.com/made-you-reset
12
reference_url https://usn.ubuntu.com/8037-1/
reference_id USN-8037-1
reference_type
scores
url https://usn.ubuntu.com/8037-1/
13
reference_url https://varnish-cache.org/security/VSV00017.html
reference_id VSV00017.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/
url https://varnish-cache.org/security/VSV00017.html
fixed_packages
0
url pkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-8671, VSV00017
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmeu-b3fh-hkaf
2
url VCID-ey97-9yys-7bha
vulnerability_id VCID-ey97-9yys-7bha
summary
Impact

Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.

An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames covering a large range of packet numbers (including packet numbers that had never been sent); see RFC 9000 Section 19.3. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support. In extreme cases, the window might grow beyond the limit of the internal variable's type, leading to an overflow panic.



Patches


quiche 0.24.4 is the earliest version containing the fix for this issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4821
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.55441
published_at 2026-04-02T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55444
published_at 2026-04-07T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55495
published_at 2026-04-09T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55505
published_at 2026-04-11T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55484
published_at 2026-04-12T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55467
published_at 2026-04-13T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55465
published_at 2026-04-04T12:55:00Z
7
value 0.00833
scoring_system epss
scoring_elements 0.74635
published_at 2026-04-16T12:55:00Z
8
value 0.00833
scoring_system epss
scoring_elements 0.74642
published_at 2026-04-18T12:55:00Z
9
value 0.00833
scoring_system epss
scoring_elements 0.74634
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4821
1
reference_url https://github.com/cloudflare/quiche/security/advisories/GHSA-6m38-4r9r-5c4m
reference_id GHSA-6m38-4r9r-5c4m
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T18:29:42Z/
url https://github.com/cloudflare/quiche/security/advisories/GHSA-6m38-4r9r-5c4m
fixed_packages
0
url pkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-4821
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ey97-9yys-7bha
3
url VCID-s9za-jdcy-fkbc
vulnerability_id VCID-s9za-jdcy-fkbc
summary
quiche connection ID retirement can trigger an infinite loop
## Impact

Cloudflare quiche was discovered to be vulnerable to an infinite loop when sending packets containing RETIRE_CONNECTION_ID frames.

QUIC connections possess a set of connection identifiers (IDs); see [Section 5.1 of RFC 9000](https://datatracker.ietf.org/doc/html/rfc9000#section-5.1). Once the QUIC handshake completes, a local endpoint is responsible for issuing and retiring Connection IDs that are used by the remote peer to populate the Destination Connection ID field in packets sent from remote to local. Each Connection ID has a sequence number to ensure synchronization between peers

An unauthenticated remote attacker can exploit this vulnerability by first completing a handshake and then sending a specially-crafted set of frames that trigger a connection ID retirement in the victim. When the victim attempts to send a packet containing RETIRE_CONNECTION_ID frames, [Section 19.16 of RFC 9000](https://datatracker.ietf.org/doc/html/rfc9000#section-19.16) requires that the sequence number of the retired connection ID must not be the same as the sequence number of the connection ID used by the packet. In other words, a packet cannot contain a frame that retires itself.  In scenarios such as path migration, it is possible for there to be multiple active paths with different active connection IDs that could be used to retire each other. The exploit triggered an unintentional behaviour of a quiche design feature that supports retirement across paths while maintaining full connection ID  synchronization, leading to an infinite loop.

## Patches

quiche 0.24.5 is the earliest version containing the fix for the issue
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-7054
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.0913
published_at 2026-04-07T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09156
published_at 2026-04-02T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09242
published_at 2026-04-11T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09206
published_at 2026-04-04T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09239
published_at 2026-04-09T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0921
published_at 2026-04-08T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10358
published_at 2026-04-21T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10227
published_at 2026-04-18T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10255
published_at 2026-04-16T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10384
published_at 2026-04-13T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10406
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-7054
1
reference_url https://github.com/cloudflare/quiche
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/cloudflare/quiche
2
reference_url https://github.com/cloudflare/quiche/security/advisories/GHSA-m3hh-f9gh-74c2
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-07T15:52:05Z/
url https://github.com/cloudflare/quiche/security/advisories/GHSA-m3hh-f9gh-74c2
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-7054
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-7054
4
reference_url https://github.com/advisories/GHSA-m3hh-f9gh-74c2
reference_id GHSA-m3hh-f9gh-74c2
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-m3hh-f9gh-74c2
fixed_packages
0
url pkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-7054, GHSA-m3hh-f9gh-74c2
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s9za-jdcy-fkbc
4
url VCID-tsj1-ebsc-zbhm
vulnerability_id VCID-tsj1-ebsc-zbhm
summary
Impact

Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.

An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames exercising an opportunistic ACK attack; see RFC 9000 Section 21.4. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support.



Patches


quiche 0.24.4 is the earliest version containing the fix for this issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4820
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.563
published_at 2026-04-02T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56354
published_at 2026-04-08T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56359
published_at 2026-04-09T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56369
published_at 2026-04-11T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.56345
published_at 2026-04-12T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.56327
published_at 2026-04-13T12:55:00Z
6
value 0.00335
scoring_system epss
scoring_elements 0.56322
published_at 2026-04-04T12:55:00Z
7
value 0.00335
scoring_system epss
scoring_elements 0.56302
published_at 2026-04-07T12:55:00Z
8
value 0.0086
scoring_system epss
scoring_elements 0.75062
published_at 2026-04-21T12:55:00Z
9
value 0.0086
scoring_system epss
scoring_elements 0.75064
published_at 2026-04-16T12:55:00Z
10
value 0.0086
scoring_system epss
scoring_elements 0.75072
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4820
1
reference_url https://github.com/cloudflare/quiche/security/advisories/GHSA-2v9p-3p3h-w56j
reference_id GHSA-2v9p-3p3h-w56j
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T18:27:27Z/
url https://github.com/cloudflare/quiche/security/advisories/GHSA-2v9p-3p3h-w56j
fixed_packages
0
url pkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/dnsdist@2.0.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-4820
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsj1-ebsc-zbhm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community