{"url":"http://public2.vulnerablecode.io/api/packages/1035650?format=json","purl":"pkg:deb/debian/pdns@2.9.21.2-1%2Blenny1","type":"deb","namespace":"debian","name":"pdns","version":"2.9.21.2-1+lenny1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"4.9.7-1","latest_non_vulnerable_version":"4.9.7-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81507?format=json","vulnerability_id":"VCID-1jzb-z2bs-vbeb","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7073","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00443","published_at":"2026-04-29T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00447","published_at":"2026-04-26T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00433","published_at":"2026-04-01T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00435","published_at":"2026-04-02T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00434","published_at":"2026-04-04T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00426","published_at":"2026-04-07T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00423","published_at":"2026-04-08T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00424","published_at":"2026-04-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00419","published_at":"2026-04-12T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00418","published_at":"2026-04-18T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00414","published_at":"2026-04-16T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00445","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074"},{"reference_url":"https://security.archlinux.org/ASA-201701-29","reference_id":"ASA-201701-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-29"},{"reference_url":"https://security.archlinux.org/ASA-201701-30","reference_id":"ASA-201701-30","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-30"},{"reference_url":"https://security.archlinux.org/AVG-147","reference_id":"AVG-147","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-147"},{"reference_url":"https://security.archlinux.org/AVG-148","reference_id":"AVG-148","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-148"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035655?format=json","purl":"pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1037089?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1"}],"aliases":["CVE-2016-7073"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1jzb-z2bs-vbeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81505?format=json","vulnerability_id":"VCID-2m6r-ztcg-gbgu","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7068","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24578","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24743","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2482","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24858","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24699","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2476","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24719","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24662","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2459","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074"},{"reference_url":"https://security.archlinux.org/ASA-201701-29","reference_id":"ASA-201701-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-29"},{"reference_url":"https://security.archlinux.org/ASA-201701-30","reference_id":"ASA-201701-30","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-30"},{"reference_url":"https://security.archlinux.org/AVG-147","reference_id":"AVG-147","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-147"},{"reference_url":"https://security.archlinux.org/AVG-148","reference_id":"AVG-148","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-148"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035655?format=json","purl":"pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1037089?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1"}],"aliases":["CVE-2016-7068"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2m6r-ztcg-gbgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81973?format=json","vulnerability_id":"VCID-37kj-yg3f-x7g3","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5427","reference_id":"","reference_type":"","scores":[{"value":"0.85547","scoring_system":"epss","scoring_elements":"0.99364","published_at":"2026-04-01T12:55:00Z"},{"value":"0.85547","scoring_system":"epss","scoring_elements":"0.99365","published_at":"2026-04-02T12:55:00Z"},{"value":"0.85547","scoring_system":"epss","scoring_elements":"0.99367","published_at":"2026-04-04T12:55:00Z"},{"value":"0.85547","scoring_system":"epss","scoring_elements":"0.99369","published_at":"2026-04-07T12:55:00Z"},{"value":"0.85547","scoring_system":"epss","scoring_elements":"0.9937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.85547","scoring_system":"epss","scoring_elements":"0.99371","published_at":"2026-04-13T12:55:00Z"},{"value":"0.85547","scoring_system":"epss","scoring_elements":"0.99372","published_at":"2026-04-12T12:55:00Z"},{"value":"0.85547","scoring_system":"epss","scoring_elements":"0.99373","published_at":"2026-04-21T12:55:00Z"},{"value":"0.85547","scoring_system":"epss","scoring_elements":"0.99374","published_at":"2026-04-24T12:55:00Z"},{"value":"0.85547","scoring_system":"epss","scoring_elements":"0.99375","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035655?format=json","purl":"pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1037089?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1"}],"aliases":["CVE-2016-5427"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-37kj-yg3f-x7g3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93561?format=json","vulnerability_id":"VCID-4c2u-n7p5-nfg4","summary":"PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14626","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12488","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12642","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12605","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12635","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12671","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12691","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1251","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12518","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12632","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14626"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162","reference_id":"913162","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163","reference_id":"913163","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163"},{"reference_url":"https://security.archlinux.org/ASA-201811-12","reference_id":"ASA-201811-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-12"},{"reference_url":"https://security.archlinux.org/ASA-201811-13","reference_id":"ASA-201811-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-13"},{"reference_url":"https://security.archlinux.org/AVG-804","reference_id":"AVG-804","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-804"},{"reference_url":"https://security.archlinux.org/AVG-805","reference_id":"AVG-805","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-805"},{"reference_url":"https://usn.ubuntu.com/7203-1/","reference_id":"USN-7203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7203-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049940?format=json","purl":"pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1"}],"aliases":["CVE-2018-14626"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4c2u-n7p5-nfg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79054?format=json","vulnerability_id":"VCID-5efj-fcg6-cuc5","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10162","reference_id":"","reference_type":"","scores":[{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0067","published_at":"2026-04-29T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0064","published_at":"2026-04-01T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00644","published_at":"2026-04-02T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00637","published_at":"2026-04-04T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00639","published_at":"2026-04-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00638","published_at":"2026-04-08T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00632","published_at":"2026-04-09T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00631","published_at":"2026-04-11T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00626","published_at":"2026-04-18T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00628","published_at":"2026-04-13T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0062","published_at":"2026-04-16T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00667","published_at":"2026-04-21T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00666","published_at":"2026-04-24T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00669","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037090?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1049940?format=json","purl":"pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1"}],"aliases":["CVE-2019-10162"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5efj-fcg6-cuc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79055?format=json","vulnerability_id":"VCID-8fks-8s21-b7b4","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10163","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00736","published_at":"2026-04-29T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00706","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00709","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0071","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.007","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00694","published_at":"2026-04-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00693","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00687","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00735","published_at":"2026-04-21T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00737","published_at":"2026-04-24T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00738","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037090?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1049940?format=json","purl":"pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1"}],"aliases":["CVE-2019-10163"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fks-8s21-b7b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92732?format=json","vulnerability_id":"VCID-bb3a-3ehq-8bhd","summary":"PowerDNS (aka pdns) Authoritative Server 3.4.4 before 3.4.7 allows remote attackers to cause a denial of service (assertion failure and server crash) via crafted query packets.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171865.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171865.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171976.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171976.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172193.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172193.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5311","reference_id":"","reference_type":"","scores":[{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.65053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.6491","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.6496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.64987","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.6495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.64999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.65013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.65031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.65021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.64993","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.6503","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.6504","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.65024","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.65043","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00478","scoring_system":"epss","scoring_elements":"0.65056","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5311"},{"reference_url":"https://doc.powerdns.com/md/security/powerdns-advisory-2015-03/","reference_id":"","reference_type":"","scores":[],"url":"https://doc.powerdns.com/md/security/powerdns-advisory-2015-03/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/09/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/09/3"},{"reference_url":"http://www.securitytracker.com/id/1034098","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034098"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative:3.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative:3.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5311","reference_id":"CVE-2015-5311","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5311"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037089?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1"}],"aliases":["CVE-2015-5311"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bb3a-3ehq-8bhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93458?format=json","vulnerability_id":"VCID-ch2d-p2ru-23ex","summary":"PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10851","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2874","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28924","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28811","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29262","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2918","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29186","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2914","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29088","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29114","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29091","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29044","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10851"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162","reference_id":"913162","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163","reference_id":"913163","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163"},{"reference_url":"https://security.archlinux.org/ASA-201811-12","reference_id":"ASA-201811-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-12"},{"reference_url":"https://security.archlinux.org/ASA-201811-13","reference_id":"ASA-201811-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-13"},{"reference_url":"https://security.archlinux.org/AVG-804","reference_id":"AVG-804","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-804"},{"reference_url":"https://security.archlinux.org/AVG-805","reference_id":"AVG-805","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-805"},{"reference_url":"https://usn.ubuntu.com/7203-1/","reference_id":"USN-7203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7203-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049940?format=json","purl":"pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1"}],"aliases":["CVE-2018-10851"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ch2d-p2ru-23ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92701?format=json","vulnerability_id":"VCID-d13q-prqh-buge","summary":"The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1868","reference_id":"","reference_type":"","scores":[{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66161","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66202","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66198","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66246","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66279","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66266","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66235","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.6627","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66285","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66307","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1868"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037086?format=json","purl":"pkg:deb/debian/pdns@3.4.4-2~bpo7%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.4-2~bpo7%252B1"}],"aliases":["CVE-2015-1868"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d13q-prqh-buge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94498?format=json","vulnerability_id":"VCID-ez68-8ben-nuef","summary":"An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24696","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22795","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22586","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22732","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22652","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22649","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22446","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22434","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24696"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049941?format=json","purl":"pkg:deb/debian/pdns@4.4.1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6pjd-r9ca-rbgg"},{"vulnerability":"VCID-6uz8-kz5m-8ya9"},{"vulnerability":"VCID-7dc3-qdk8-k7b2"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-g4df-vh2e-abch"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-xa6z-cw1x-7qba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1"}],"aliases":["CVE-2020-24696"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ez68-8ben-nuef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81971?format=json","vulnerability_id":"VCID-gj88-me79-1qb3","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5426","reference_id":"","reference_type":"","scores":[{"value":"0.33823","scoring_system":"epss","scoring_elements":"0.96923","published_at":"2026-04-01T12:55:00Z"},{"value":"0.33823","scoring_system":"epss","scoring_elements":"0.96931","published_at":"2026-04-02T12:55:00Z"},{"value":"0.33823","scoring_system":"epss","scoring_elements":"0.96936","published_at":"2026-04-04T12:55:00Z"},{"value":"0.33823","scoring_system":"epss","scoring_elements":"0.96939","published_at":"2026-04-07T12:55:00Z"},{"value":"0.33823","scoring_system":"epss","scoring_elements":"0.96947","published_at":"2026-04-08T12:55:00Z"},{"value":"0.3697","scoring_system":"epss","scoring_elements":"0.9715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.3697","scoring_system":"epss","scoring_elements":"0.97154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.3697","scoring_system":"epss","scoring_elements":"0.97155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.3697","scoring_system":"epss","scoring_elements":"0.97156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.3697","scoring_system":"epss","scoring_elements":"0.97163","published_at":"2026-04-16T12:55:00Z"},{"value":"0.3697","scoring_system":"epss","scoring_elements":"0.97165","published_at":"2026-04-18T12:55:00Z"},{"value":"0.3697","scoring_system":"epss","scoring_elements":"0.97169","published_at":"2026-04-21T12:55:00Z"},{"value":"0.3697","scoring_system":"epss","scoring_elements":"0.9717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.3697","scoring_system":"epss","scoring_elements":"0.97171","published_at":"2026-04-26T12:55:00Z"},{"value":"0.3697","scoring_system":"epss","scoring_elements":"0.97173","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035655?format=json","purl":"pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1037089?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1"}],"aliases":["CVE-2016-5426"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gj88-me79-1qb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93451?format=json","vulnerability_id":"VCID-jrb1-cuhc-nqa1","summary":"pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1046","reference_id":"","reference_type":"","scores":[{"value":"2e-05","scoring_system":"epss","scoring_elements":"0.00056","published_at":"2026-04-29T12:55:00Z"},{"value":"2e-05","scoring_system":"epss","scoring_elements":"0.00052","published_at":"2026-04-09T12:55:00Z"},{"value":"2e-05","scoring_system":"epss","scoring_elements":"0.00057","published_at":"2026-04-21T12:55:00Z"},{"value":"2e-05","scoring_system":"epss","scoring_elements":"0.00058","published_at":"2026-04-26T12:55:00Z"},{"value":"2e-05","scoring_system":"epss","scoring_elements":"0.00054","published_at":"2026-04-18T12:55:00Z"},{"value":"2e-05","scoring_system":"epss","scoring_elements":"0.00053","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1046","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1046"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898255","reference_id":"898255","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898255"},{"reference_url":"https://security.archlinux.org/ASA-201805-1","reference_id":"ASA-201805-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-1"},{"reference_url":"https://security.archlinux.org/AVG-686","reference_id":"AVG-686","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-686"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:pdns:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:pdns:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:pdns:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1046","reference_id":"CVE-2018-1046","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1046"},{"reference_url":"https://usn.ubuntu.com/7203-1/","reference_id":"USN-7203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7203-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049940?format=json","purl":"pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1"}],"aliases":["CVE-2018-1046"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jrb1-cuhc-nqa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93138?format=json","vulnerability_id":"VCID-keaf-6ca3-vkbc","summary":"An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15091","reference_id":"","reference_type":"","scores":[{"value":"3e-05","scoring_system":"epss","scoring_elements":"0.00069","published_at":"2026-04-18T12:55:00Z"},{"value":"3e-05","scoring_system":"epss","scoring_elements":"0.00071","published_at":"2026-04-29T12:55:00Z"},{"value":"3e-05","scoring_system":"epss","scoring_elements":"0.00072","published_at":"2026-04-21T12:55:00Z"},{"value":"3e-05","scoring_system":"epss","scoring_elements":"0.0007","published_at":"2026-04-04T12:55:00Z"},{"value":"3e-05","scoring_system":"epss","scoring_elements":"0.00068","published_at":"2026-04-16T12:55:00Z"},{"value":"3e-05","scoring_system":"epss","scoring_elements":"0.00073","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15091"},{"reference_url":"https://security.archlinux.org/ASA-201711-30","reference_id":"ASA-201711-30","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-30"},{"reference_url":"https://security.archlinux.org/AVG-519","reference_id":"AVG-519","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-519"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049940?format=json","purl":"pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1"}],"aliases":["CVE-2017-15091"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-keaf-6ca3-vkbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42272?format=json","vulnerability_id":"VCID-m7h2-vam9-1yhn","summary":"An information disclosure vulnerability in PowerDNS allow remote\n    attackers to obtain sensitive information.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-17482","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15547","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1559","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15657","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15461","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15387","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15444","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15426","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-17482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17482"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970737","reference_id":"970737","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970737"},{"reference_url":"https://security.gentoo.org/glsa/202012-18","reference_id":"GLSA-202012-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-18"},{"reference_url":"https://usn.ubuntu.com/7203-1/","reference_id":"USN-7203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7203-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049941?format=json","purl":"pkg:deb/debian/pdns@4.4.1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6pjd-r9ca-rbgg"},{"vulnerability":"VCID-6uz8-kz5m-8ya9"},{"vulnerability":"VCID-7dc3-qdk8-k7b2"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-g4df-vh2e-abch"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-xa6z-cw1x-7qba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1"}],"aliases":["CVE-2020-17482"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m7h2-vam9-1yhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81506?format=json","vulnerability_id":"VCID-mnn7-6732-ykdm","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7072","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08299","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08294","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08348","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08401","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08322","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08386","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08402","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08394","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08375","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08252","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08235","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08398","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08368","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08334","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7072"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074"},{"reference_url":"https://security.archlinux.org/ASA-201701-29","reference_id":"ASA-201701-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-29"},{"reference_url":"https://security.archlinux.org/AVG-147","reference_id":"AVG-147","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-147"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035655?format=json","purl":"pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1037089?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1"}],"aliases":["CVE-2016-7072"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mnn7-6732-ykdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80920?format=json","vulnerability_id":"VCID-nwfa-n5f2-abe7","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5470","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.0045","published_at":"2026-04-29T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00435","published_at":"2026-04-01T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00439","published_at":"2026-04-04T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00431","published_at":"2026-04-07T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00428","published_at":"2026-04-08T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.0043","published_at":"2026-04-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00425","published_at":"2026-04-18T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00424","published_at":"2026-04-13T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00421","published_at":"2026-04-16T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00455","published_at":"2026-04-26T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00453","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5470"},{"reference_url":"https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/","reference_id":"","reference_type":"","scores":[],"url":"https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/07/07/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/07/07/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/07/10/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/07/10/8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5470","reference_id":"CVE-2015-5470","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5470"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035655?format=json","purl":"pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1037087?format=json","purl":"pkg:deb/debian/pdns@3.4.6-1~bpo7%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.6-1~bpo7%252B1"}],"aliases":["CVE-2015-5470"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfa-n5f2-abe7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92635?format=json","vulnerability_id":"VCID-q6d4-mv53-syhu","summary":"pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissions for the pdns user. Other backends are not affected.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7210","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29111","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29186","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29238","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29049","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2916","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.3114","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31173","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31123","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57479","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57498","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57477","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7210"},{"reference_url":"https://salsa.debian.org/debian/pdns/-/commit/f0de6b3583039bb63344fbd5eb246939264d7b05","reference_id":"f0de6b3583039bb63344fbd5eb246939264d7b05","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-27T18:43:03Z/"}],"url":"https://salsa.debian.org/debian/pdns/-/commit/f0de6b3583039bb63344fbd5eb246939264d7b05"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2016/05/msg00046.html","reference_id":"msg00046.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-27T18:43:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2016/05/msg00046.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035653?format=json","purl":"pkg:deb/debian/pdns@3.3.1-3~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.3.1-3~bpo70%252B1"}],"aliases":["CVE-2014-7210"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q6d4-mv53-syhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94499?format=json","vulnerability_id":"VCID-qbnt-a5xe-2bg6","summary":"An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24697","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31989","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32361","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3251","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32545","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32368","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32417","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32444","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32448","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3241","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32418","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32194","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32072","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24697"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049941?format=json","purl":"pkg:deb/debian/pdns@4.4.1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6pjd-r9ca-rbgg"},{"vulnerability":"VCID-6uz8-kz5m-8ya9"},{"vulnerability":"VCID-7dc3-qdk8-k7b2"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-g4df-vh2e-abch"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-xa6z-cw1x-7qba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1"}],"aliases":["CVE-2020-24697"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qbnt-a5xe-2bg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39144?format=json","vulnerability_id":"VCID-srnu-wj3x-2qd1","summary":"A vulnerability in PowerDNS could allow a remote attacker to create\n    a Denial of Service condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0206","reference_id":"","reference_type":"","scores":[{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00212","published_at":"2026-04-13T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00213","published_at":"2026-04-02T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00214","published_at":"2026-04-16T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00211","published_at":"2026-04-07T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.0021","published_at":"2026-04-09T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00215","published_at":"2026-04-18T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00222","published_at":"2026-04-24T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00221","published_at":"2026-04-26T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00219","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0206"},{"reference_url":"https://security.gentoo.org/glsa/201202-04","reference_id":"GLSA-201202-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201202-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035652?format=json","purl":"pkg:deb/debian/pdns@3.1-4.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-q6d4-mv53-syhu"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.1-4.1"}],"aliases":["CVE-2012-0206"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-srnu-wj3x-2qd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80910?format=json","vulnerability_id":"VCID-tqpr-vezf-4ye4","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5230","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.3932","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39343","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39257","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39312","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39329","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.3934","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39302","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39284","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39308","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39221","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5256","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5230"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035655?format=json","purl":"pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1037088?format=json","purl":"pkg:deb/debian/pdns@3.4.7-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.7-1~bpo8%252B1"}],"aliases":["CVE-2015-5230"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqpr-vezf-4ye4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93863?format=json","vulnerability_id":"VCID-w3fn-hwyn-6ba7","summary":"PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10203","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05795","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05787","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05506","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05578","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05575","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05638","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05602","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05545","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05559","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10203"},{"reference_url":"https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-06.html","reference_id":"","reference_type":"","scores":[],"url":"https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-06.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970729","reference_id":"970729","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970729"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10203","reference_id":"CVE-2019-10203","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10203"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049941?format=json","purl":"pkg:deb/debian/pdns@4.4.1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6pjd-r9ca-rbgg"},{"vulnerability":"VCID-6uz8-kz5m-8ya9"},{"vulnerability":"VCID-7dc3-qdk8-k7b2"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-g4df-vh2e-abch"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-xa6z-cw1x-7qba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1"}],"aliases":["CVE-2019-10203"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w3fn-hwyn-6ba7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79401?format=json","vulnerability_id":"VCID-w9w8-k8h2-b7fc","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00022.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3871","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09071","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09272","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0913","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09211","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09242","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09196","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09091","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3871"},{"reference_url":"https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html","reference_id":"","reference_type":"","scores":[],"url":"https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00039.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWUHF6MRSQ3YO7UUISGLV7MXCAGBW2VD/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWUHF6MRSQ3YO7UUISGLV7MXCAGBW2VD/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROFI6OTWF4GKONNSNEDUCW6LVSSEBZNF/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROFI6OTWF4GKONNSNEDUCW6LVSSEBZNF/"},{"reference_url":"https://seclists.org/bugtraq/2019/Apr/8","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Apr/8"},{"reference_url":"https://www.debian.org/security/2019/dsa-4424","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4424"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/03/18/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/03/18/4"},{"reference_url":"http://www.securityfocus.com/bid/107491","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107491"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924966","reference_id":"924966","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924966"},{"reference_url":"https://security.archlinux.org/ASA-201903-13","reference_id":"ASA-201903-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201903-13"},{"reference_url":"https://security.archlinux.org/AVG-927","reference_id":"AVG-927","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-927"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3871","reference_id":"CVE-2019-3871","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3871"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037090?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1049940?format=json","purl":"pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1"}],"aliases":["CVE-2019-3871"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w9w8-k8h2-b7fc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81974?format=json","vulnerability_id":"VCID-xmmj-hpq2-kyad","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6172","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0268","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02768","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02773","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02743","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05207","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05209","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04992","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05139","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830808","reference_id":"830808","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830808"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035655?format=json","purl":"pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1037089?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1"}],"aliases":["CVE-2016-6172"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xmmj-hpq2-kyad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81504?format=json","vulnerability_id":"VCID-xvg6-5zhw-8fdk","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2120","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32203","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32574","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32709","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32744","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32613","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32639","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32641","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32603","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32559","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32402","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32287","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074"},{"reference_url":"https://security.archlinux.org/ASA-201701-29","reference_id":"ASA-201701-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-29"},{"reference_url":"https://security.archlinux.org/AVG-147","reference_id":"AVG-147","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-147"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035655?format=json","purl":"pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1037089?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1"}],"aliases":["CVE-2016-2120"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xvg6-5zhw-8fdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94500?format=json","vulnerability_id":"VCID-zcxy-ae2g-3kdy","summary":"An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24698","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09628","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09769","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0975","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0962","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09592","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09737","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0978","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09747","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09706","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24698"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049941?format=json","purl":"pkg:deb/debian/pdns@4.4.1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6pjd-r9ca-rbgg"},{"vulnerability":"VCID-6uz8-kz5m-8ya9"},{"vulnerability":"VCID-7dc3-qdk8-k7b2"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-g4df-vh2e-abch"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-xa6z-cw1x-7qba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1"}],"aliases":["CVE-2020-24698"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxy-ae2g-3kdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81508?format=json","vulnerability_id":"VCID-zdzj-q58r-5uby","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7074","reference_id":"","reference_type":"","scores":[{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.00166","published_at":"2026-04-29T12:55:00Z"},{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.00169","published_at":"2026-04-26T12:55:00Z"},{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.00161","published_at":"2026-04-02T12:55:00Z"},{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.00162","published_at":"2026-04-08T12:55:00Z"},{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.00163","published_at":"2026-04-13T12:55:00Z"},{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.00164","published_at":"2026-04-12T12:55:00Z"},{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.00165","published_at":"2026-04-18T12:55:00Z"},{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.00168","published_at":"2026-04-21T12:55:00Z"},{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.0017","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074"},{"reference_url":"https://security.archlinux.org/ASA-201701-29","reference_id":"ASA-201701-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-29"},{"reference_url":"https://security.archlinux.org/ASA-201701-30","reference_id":"ASA-201701-30","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-30"},{"reference_url":"https://security.archlinux.org/AVG-147","reference_id":"AVG-147","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-147"},{"reference_url":"https://security.archlinux.org/AVG-148","reference_id":"AVG-148","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-148"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035655?format=json","purl":"pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1037089?format=json","purl":"pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1"}],"aliases":["CVE-2016-7074"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zdzj-q58r-5uby"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47703?format=json","vulnerability_id":"VCID-6nht-qd1p-qbbz","summary":"Two vulnerabilities have been discovered in PowerDNS, possibly leading to a\n    Denial of Service and easing cache poisoning attacks.","references":[{"reference_url":"http://doc.powerdns.com/changelog.html","reference_id":"","reference_type":"","scores":[],"url":"http://doc.powerdns.com/changelog.html"},{"reference_url":"http://doc.powerdns.com/powerdns-advisory-2008-02.html","reference_id":"","reference_type":"","scores":[],"url":"http://doc.powerdns.com/powerdns-advisory-2008-02.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"},{"reference_url":"http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html","reference_id":"","reference_type":"","scores":[],"url":"http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3337.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3337.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3337","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05374","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05445","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05486","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05507","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05467","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05412","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0542","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05623","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0566","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337"},{"reference_url":"http://secunia.com/advisories/31401","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31401"},{"reference_url":"http://secunia.com/advisories/31407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31407"},{"reference_url":"http://secunia.com/advisories/31448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31448"},{"reference_url":"http://secunia.com/advisories/31687","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31687"},{"reference_url":"http://secunia.com/advisories/33264","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33264"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200812-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200812-19.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44253","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44253"},{"reference_url":"https://www.debian.org/security/2008/dsa-1628","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2008/dsa-1628"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html"},{"reference_url":"http://www.securityfocus.com/bid/30587","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30587"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2320","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2320"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=458122","reference_id":"458122","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=458122"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3337","reference_id":"CVE-2008-3337","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3337"},{"reference_url":"https://security.gentoo.org/glsa/200812-19","reference_id":"GLSA-200812-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200812-19"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035650?format=json","purl":"pkg:deb/debian/pdns@2.9.21.2-1%2Blenny1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-q6d4-mv53-syhu"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-srnu-wj3x-2qd1"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@2.9.21.2-1%252Blenny1"}],"aliases":["CVE-2008-3337"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6nht-qd1p-qbbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47704?format=json","vulnerability_id":"VCID-j5zf-9dpp-qkh6","summary":"Two vulnerabilities have been discovered in PowerDNS, possibly leading to a\n    Denial of Service and easing cache poisoning attacks.","references":[{"reference_url":"http://doc.powerdns.com/powerdns-advisory-2008-03.html","reference_id":"","reference_type":"","scores":[],"url":"http://doc.powerdns.com/powerdns-advisory-2008-03.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5277.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5277.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5277","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08547","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08495","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08524","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08497","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08587","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08441","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08426","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08598","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08551","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5277"},{"reference_url":"http://secunia.com/advisories/32979","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32979"},{"reference_url":"http://secunia.com/advisories/33264","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33264"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200812-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200812-19.xml"},{"reference_url":"http://securitytracker.com/id?1021304","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1021304"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47076","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47076"},{"reference_url":"http://www.securityfocus.com/bid/32627","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32627"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=475440","reference_id":"475440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=475440"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:1.99.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5277","reference_id":"CVE-2008-5277","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5277"},{"reference_url":"https://security.gentoo.org/glsa/200812-19","reference_id":"GLSA-200812-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200812-19"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035650?format=json","purl":"pkg:deb/debian/pdns@2.9.21.2-1%2Blenny1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1jzb-z2bs-vbeb"},{"vulnerability":"VCID-2m6r-ztcg-gbgu"},{"vulnerability":"VCID-37kj-yg3f-x7g3"},{"vulnerability":"VCID-4c2u-n7p5-nfg4"},{"vulnerability":"VCID-5efj-fcg6-cuc5"},{"vulnerability":"VCID-8fks-8s21-b7b4"},{"vulnerability":"VCID-bb3a-3ehq-8bhd"},{"vulnerability":"VCID-ch2d-p2ru-23ex"},{"vulnerability":"VCID-d13q-prqh-buge"},{"vulnerability":"VCID-ez68-8ben-nuef"},{"vulnerability":"VCID-gj88-me79-1qb3"},{"vulnerability":"VCID-jrb1-cuhc-nqa1"},{"vulnerability":"VCID-keaf-6ca3-vkbc"},{"vulnerability":"VCID-m7h2-vam9-1yhn"},{"vulnerability":"VCID-mnn7-6732-ykdm"},{"vulnerability":"VCID-nwfa-n5f2-abe7"},{"vulnerability":"VCID-q6d4-mv53-syhu"},{"vulnerability":"VCID-qbnt-a5xe-2bg6"},{"vulnerability":"VCID-srnu-wj3x-2qd1"},{"vulnerability":"VCID-tqpr-vezf-4ye4"},{"vulnerability":"VCID-w3fn-hwyn-6ba7"},{"vulnerability":"VCID-w9w8-k8h2-b7fc"},{"vulnerability":"VCID-xmmj-hpq2-kyad"},{"vulnerability":"VCID-xvg6-5zhw-8fdk"},{"vulnerability":"VCID-zcxy-ae2g-3kdy"},{"vulnerability":"VCID-zdzj-q58r-5uby"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@2.9.21.2-1%252Blenny1"}],"aliases":["CVE-2008-5277"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j5zf-9dpp-qkh6"}],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@2.9.21.2-1%252Blenny1"}