Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/pdns-recursor@4.8.1-1?distro=trixie
Typedeb
Namespacedebian
Namepdns-recursor
Version4.8.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.8.4-1
Latest_non_vulnerable_version5.4.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-36qt-fxee-ruae
vulnerability_id VCID-36qt-fxee-ruae
summary A remote attacker might be able to cause infinite recursion in PowerDNS Recursor 4.8.0 via a DNS query that retrieves DS records for a misconfigured domain, because QName minimization is used in QM fallback mode. This is fixed in 4.8.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22617
reference_id
reference_type
scores
0
value 0.01064
scoring_system epss
scoring_elements 0.77702
published_at 2026-04-21T12:55:00Z
1
value 0.01064
scoring_system epss
scoring_elements 0.7769
published_at 2026-04-11T12:55:00Z
2
value 0.01064
scoring_system epss
scoring_elements 0.77674
published_at 2026-04-12T12:55:00Z
3
value 0.01064
scoring_system epss
scoring_elements 0.77673
published_at 2026-04-13T12:55:00Z
4
value 0.01064
scoring_system epss
scoring_elements 0.7771
published_at 2026-04-16T12:55:00Z
5
value 0.01064
scoring_system epss
scoring_elements 0.77708
published_at 2026-04-18T12:55:00Z
6
value 0.01064
scoring_system epss
scoring_elements 0.77621
published_at 2026-04-02T12:55:00Z
7
value 0.01064
scoring_system epss
scoring_elements 0.77648
published_at 2026-04-04T12:55:00Z
8
value 0.01064
scoring_system epss
scoring_elements 0.7763
published_at 2026-04-07T12:55:00Z
9
value 0.01064
scoring_system epss
scoring_elements 0.77659
published_at 2026-04-08T12:55:00Z
10
value 0.01064
scoring_system epss
scoring_elements 0.77664
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22617
1
reference_url http://www.openwall.com/lists/oss-security/2023/01/20/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:36:48Z/
url http://www.openwall.com/lists/oss-security/2023/01/20/1
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029367
reference_id 1029367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029367
3
reference_url https://docs.powerdns.com/recursor/changelog/4.8.html#change-4.8.1
reference_id 4.8.html#change-4.8.1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:36:48Z/
url https://docs.powerdns.com/recursor/changelog/4.8.html#change-4.8.1
4
reference_url https://docs.powerdns.com/recursor/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:36:48Z/
url https://docs.powerdns.com/recursor/security-advisories/
fixed_packages
0
url pkg:deb/debian/pdns-recursor@0?distro=trixie
purl pkg:deb/debian/pdns-recursor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@0%3Fdistro=trixie
1
url pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie
purl pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ugc-uygs-hqb8
1
vulnerability VCID-66sa-bc5p-jqde
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-8tar-s444-zfac
4
vulnerability VCID-cdzz-8tc8-jucu
5
vulnerability VCID-m445-c6a1-uugf
6
vulnerability VCID-mkcs-362g-t7aq
7
vulnerability VCID-pjbp-1jgm-s3cg
8
vulnerability VCID-umcq-ztbz-qfb2
9
vulnerability VCID-vprj-j7u6-zbe7
10
vulnerability VCID-wmgd-z2j3-h7d9
11
vulnerability VCID-wywf-pmyt-zud4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie
2
url pkg:deb/debian/pdns-recursor@4.8.1-1?distro=trixie
purl pkg:deb/debian/pdns-recursor@4.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.8.1-1%3Fdistro=trixie
3
url pkg:deb/debian/pdns-recursor@4.8.8-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/pdns-recursor@4.8.8-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ugc-uygs-hqb8
1
vulnerability VCID-cdzz-8tc8-jucu
2
vulnerability VCID-m445-c6a1-uugf
3
vulnerability VCID-pjbp-1jgm-s3cg
4
vulnerability VCID-umcq-ztbz-qfb2
5
vulnerability VCID-wywf-pmyt-zud4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.8.8-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/pdns-recursor@5.4.0-1?distro=trixie
purl pkg:deb/debian/pdns-recursor@5.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.0-1%3Fdistro=trixie
aliases CVE-2023-22617
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36qt-fxee-ruae
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.8.1-1%3Fdistro=trixie