Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/pdns@3.4.6-1~bpo7%2B1
Typedeb
Namespacedebian
Namepdns
Version3.4.6-1~bpo7+1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.9.7-1
Latest_non_vulnerable_version4.9.7-1
Affected_by_vulnerabilities
0
url VCID-1jzb-z2bs-vbeb
vulnerability_id VCID-1jzb-z2bs-vbeb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7073
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00443
published_at 2026-04-29T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00447
published_at 2026-04-26T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00433
published_at 2026-04-01T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00435
published_at 2026-04-02T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00434
published_at 2026-04-04T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00426
published_at 2026-04-07T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00423
published_at 2026-04-08T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00424
published_at 2026-04-11T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00419
published_at 2026-04-12T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00418
published_at 2026-04-18T12:55:00Z
10
value 6e-05
scoring_system epss
scoring_elements 0.00414
published_at 2026-04-16T12:55:00Z
11
value 6e-05
scoring_system epss
scoring_elements 0.00445
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7073
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
6
reference_url https://security.archlinux.org/ASA-201701-29
reference_id ASA-201701-29
reference_type
scores
url https://security.archlinux.org/ASA-201701-29
7
reference_url https://security.archlinux.org/ASA-201701-30
reference_id ASA-201701-30
reference_type
scores
url https://security.archlinux.org/ASA-201701-30
8
reference_url https://security.archlinux.org/AVG-147
reference_id AVG-147
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-147
9
reference_url https://security.archlinux.org/AVG-148
reference_id AVG-148
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-148
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
purl pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1
aliases CVE-2016-7073
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jzb-z2bs-vbeb
1
url VCID-2m6r-ztcg-gbgu
vulnerability_id VCID-2m6r-ztcg-gbgu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7068
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24535
published_at 2026-04-29T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24578
published_at 2026-04-26T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24743
published_at 2026-04-01T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.2482
published_at 2026-04-02T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24858
published_at 2026-04-04T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.2463
published_at 2026-04-07T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24699
published_at 2026-04-08T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24747
published_at 2026-04-09T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.2476
published_at 2026-04-11T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24719
published_at 2026-04-12T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24662
published_at 2026-04-13T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24675
published_at 2026-04-16T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24667
published_at 2026-04-18T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24647
published_at 2026-04-21T12:55:00Z
14
value 0.00085
scoring_system epss
scoring_elements 0.2459
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7068
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
6
reference_url https://security.archlinux.org/ASA-201701-29
reference_id ASA-201701-29
reference_type
scores
url https://security.archlinux.org/ASA-201701-29
7
reference_url https://security.archlinux.org/ASA-201701-30
reference_id ASA-201701-30
reference_type
scores
url https://security.archlinux.org/ASA-201701-30
8
reference_url https://security.archlinux.org/AVG-147
reference_id AVG-147
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-147
9
reference_url https://security.archlinux.org/AVG-148
reference_id AVG-148
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-148
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
purl pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1
aliases CVE-2016-7068
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2m6r-ztcg-gbgu
2
url VCID-37kj-yg3f-x7g3
vulnerability_id VCID-37kj-yg3f-x7g3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5427
reference_id
reference_type
scores
0
value 0.85547
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-01T12:55:00Z
1
value 0.85547
scoring_system epss
scoring_elements 0.99365
published_at 2026-04-02T12:55:00Z
2
value 0.85547
scoring_system epss
scoring_elements 0.99367
published_at 2026-04-04T12:55:00Z
3
value 0.85547
scoring_system epss
scoring_elements 0.99369
published_at 2026-04-07T12:55:00Z
4
value 0.85547
scoring_system epss
scoring_elements 0.9937
published_at 2026-04-09T12:55:00Z
5
value 0.85547
scoring_system epss
scoring_elements 0.99371
published_at 2026-04-13T12:55:00Z
6
value 0.85547
scoring_system epss
scoring_elements 0.99372
published_at 2026-04-12T12:55:00Z
7
value 0.85547
scoring_system epss
scoring_elements 0.99373
published_at 2026-04-21T12:55:00Z
8
value 0.85547
scoring_system epss
scoring_elements 0.99374
published_at 2026-04-24T12:55:00Z
9
value 0.85547
scoring_system epss
scoring_elements 0.99375
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5427
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
purl pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1
aliases CVE-2016-5427
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-37kj-yg3f-x7g3
3
url VCID-4c2u-n7p5-nfg4
vulnerability_id VCID-4c2u-n7p5-nfg4
summary PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14626
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12488
published_at 2026-04-29T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12642
published_at 2026-04-24T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12605
published_at 2026-04-26T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12635
published_at 2026-04-01T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12739
published_at 2026-04-02T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12785
published_at 2026-04-04T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12592
published_at 2026-04-07T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12671
published_at 2026-04-08T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12723
published_at 2026-04-09T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12691
published_at 2026-04-11T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.1265
published_at 2026-04-12T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12606
published_at 2026-04-13T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.1251
published_at 2026-04-16T12:55:00Z
13
value 0.00042
scoring_system epss
scoring_elements 0.12518
published_at 2026-04-18T12:55:00Z
14
value 0.00042
scoring_system epss
scoring_elements 0.12632
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14626
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14626
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162
reference_id 913162
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163
reference_id 913163
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163
5
reference_url https://security.archlinux.org/ASA-201811-12
reference_id ASA-201811-12
reference_type
scores
url https://security.archlinux.org/ASA-201811-12
6
reference_url https://security.archlinux.org/ASA-201811-13
reference_id ASA-201811-13
reference_type
scores
url https://security.archlinux.org/ASA-201811-13
7
reference_url https://security.archlinux.org/AVG-804
reference_id AVG-804
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-804
8
reference_url https://security.archlinux.org/AVG-805
reference_id AVG-805
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-805
9
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
purl pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ez68-8ben-nuef
1
vulnerability VCID-m7h2-vam9-1yhn
2
vulnerability VCID-qbnt-a5xe-2bg6
3
vulnerability VCID-w3fn-hwyn-6ba7
4
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1
aliases CVE-2018-14626
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4c2u-n7p5-nfg4
4
url VCID-5efj-fcg6-cuc5
vulnerability_id VCID-5efj-fcg6-cuc5
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10162
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.0067
published_at 2026-04-29T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.0064
published_at 2026-04-01T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00644
published_at 2026-04-02T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00637
published_at 2026-04-04T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00639
published_at 2026-04-07T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00638
published_at 2026-04-08T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00632
published_at 2026-04-09T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00631
published_at 2026-04-11T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00626
published_at 2026-04-18T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.00628
published_at 2026-04-13T12:55:00Z
10
value 7e-05
scoring_system epss
scoring_elements 0.0062
published_at 2026-04-16T12:55:00Z
11
value 7e-05
scoring_system epss
scoring_elements 0.00667
published_at 2026-04-21T12:55:00Z
12
value 7e-05
scoring_system epss
scoring_elements 0.00666
published_at 2026-04-24T12:55:00Z
13
value 7e-05
scoring_system epss
scoring_elements 0.00669
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10162
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1%2Bdeb9u5
purl pkg:deb/debian/pdns@4.0.3-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1%252Bdeb9u5
1
url pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
purl pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ez68-8ben-nuef
1
vulnerability VCID-m7h2-vam9-1yhn
2
vulnerability VCID-qbnt-a5xe-2bg6
3
vulnerability VCID-w3fn-hwyn-6ba7
4
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1
aliases CVE-2019-10162
risk_score 0.9
exploitability 0.5
weighted_severity 1.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5efj-fcg6-cuc5
5
url VCID-8fks-8s21-b7b4
vulnerability_id VCID-8fks-8s21-b7b4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10163
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00736
published_at 2026-04-29T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00706
published_at 2026-04-04T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00709
published_at 2026-04-08T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.0071
published_at 2026-04-07T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.007
published_at 2026-04-11T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00694
published_at 2026-04-12T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00693
published_at 2026-04-18T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00687
published_at 2026-04-16T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00735
published_at 2026-04-21T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00737
published_at 2026-04-24T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.00738
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10163
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1%2Bdeb9u5
purl pkg:deb/debian/pdns@4.0.3-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1%252Bdeb9u5
1
url pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
purl pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ez68-8ben-nuef
1
vulnerability VCID-m7h2-vam9-1yhn
2
vulnerability VCID-qbnt-a5xe-2bg6
3
vulnerability VCID-w3fn-hwyn-6ba7
4
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1
aliases CVE-2019-10163
risk_score 0.9
exploitability 0.5
weighted_severity 1.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fks-8s21-b7b4
6
url VCID-bb3a-3ehq-8bhd
vulnerability_id VCID-bb3a-3ehq-8bhd
summary PowerDNS (aka pdns) Authoritative Server 3.4.4 before 3.4.7 allows remote attackers to cause a denial of service (assertion failure and server crash) via crafted query packets.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171865.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171865.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171976.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172193.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172193.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5311
reference_id
reference_type
scores
0
value 0.00478
scoring_system epss
scoring_elements 0.65053
published_at 2026-04-29T12:55:00Z
1
value 0.00478
scoring_system epss
scoring_elements 0.6491
published_at 2026-04-01T12:55:00Z
2
value 0.00478
scoring_system epss
scoring_elements 0.6496
published_at 2026-04-02T12:55:00Z
3
value 0.00478
scoring_system epss
scoring_elements 0.64987
published_at 2026-04-04T12:55:00Z
4
value 0.00478
scoring_system epss
scoring_elements 0.6495
published_at 2026-04-07T12:55:00Z
5
value 0.00478
scoring_system epss
scoring_elements 0.64999
published_at 2026-04-08T12:55:00Z
6
value 0.00478
scoring_system epss
scoring_elements 0.65013
published_at 2026-04-09T12:55:00Z
7
value 0.00478
scoring_system epss
scoring_elements 0.65031
published_at 2026-04-11T12:55:00Z
8
value 0.00478
scoring_system epss
scoring_elements 0.65021
published_at 2026-04-12T12:55:00Z
9
value 0.00478
scoring_system epss
scoring_elements 0.64993
published_at 2026-04-13T12:55:00Z
10
value 0.00478
scoring_system epss
scoring_elements 0.6503
published_at 2026-04-16T12:55:00Z
11
value 0.00478
scoring_system epss
scoring_elements 0.6504
published_at 2026-04-18T12:55:00Z
12
value 0.00478
scoring_system epss
scoring_elements 0.65024
published_at 2026-04-21T12:55:00Z
13
value 0.00478
scoring_system epss
scoring_elements 0.65043
published_at 2026-04-24T12:55:00Z
14
value 0.00478
scoring_system epss
scoring_elements 0.65056
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5311
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5311
5
reference_url https://doc.powerdns.com/md/security/powerdns-advisory-2015-03/
reference_id
reference_type
scores
url https://doc.powerdns.com/md/security/powerdns-advisory-2015-03/
6
reference_url http://www.openwall.com/lists/oss-security/2015/11/09/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/09/3
7
reference_url http://www.securitytracker.com/id/1034098
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034098
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.5:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.6:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5311
reference_id CVE-2015-5311
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-5311
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
purl pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1
aliases CVE-2015-5311
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bb3a-3ehq-8bhd
7
url VCID-ch2d-p2ru-23ex
vulnerability_id VCID-ch2d-p2ru-23ex
summary PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10851
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.2874
published_at 2026-04-29T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.28924
published_at 2026-04-24T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.28811
published_at 2026-04-26T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29135
published_at 2026-04-01T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.2921
published_at 2026-04-02T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29262
published_at 2026-04-04T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29075
published_at 2026-04-07T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29138
published_at 2026-04-08T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.2918
published_at 2026-04-09T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29186
published_at 2026-04-11T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.2914
published_at 2026-04-12T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29088
published_at 2026-04-13T12:55:00Z
12
value 0.00108
scoring_system epss
scoring_elements 0.29114
published_at 2026-04-16T12:55:00Z
13
value 0.00108
scoring_system epss
scoring_elements 0.29091
published_at 2026-04-18T12:55:00Z
14
value 0.00108
scoring_system epss
scoring_elements 0.29044
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10851
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10851
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162
reference_id 913162
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163
reference_id 913163
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163
5
reference_url https://security.archlinux.org/ASA-201811-12
reference_id ASA-201811-12
reference_type
scores
url https://security.archlinux.org/ASA-201811-12
6
reference_url https://security.archlinux.org/ASA-201811-13
reference_id ASA-201811-13
reference_type
scores
url https://security.archlinux.org/ASA-201811-13
7
reference_url https://security.archlinux.org/AVG-804
reference_id AVG-804
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-804
8
reference_url https://security.archlinux.org/AVG-805
reference_id AVG-805
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-805
9
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
purl pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ez68-8ben-nuef
1
vulnerability VCID-m7h2-vam9-1yhn
2
vulnerability VCID-qbnt-a5xe-2bg6
3
vulnerability VCID-w3fn-hwyn-6ba7
4
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1
aliases CVE-2018-10851
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ch2d-p2ru-23ex
8
url VCID-ez68-8ben-nuef
vulnerability_id VCID-ez68-8ben-nuef
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24696
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22579
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22751
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22795
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22586
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22662
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22713
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22732
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22693
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22636
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22652
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22649
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.226
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22446
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22436
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22434
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24696
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24696
fixed_packages
0
url pkg:deb/debian/pdns@4.4.1-1
purl pkg:deb/debian/pdns@4.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1
aliases CVE-2020-24696
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ez68-8ben-nuef
9
url VCID-gj88-me79-1qb3
vulnerability_id VCID-gj88-me79-1qb3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5426
reference_id
reference_type
scores
0
value 0.33823
scoring_system epss
scoring_elements 0.96923
published_at 2026-04-01T12:55:00Z
1
value 0.33823
scoring_system epss
scoring_elements 0.96931
published_at 2026-04-02T12:55:00Z
2
value 0.33823
scoring_system epss
scoring_elements 0.96936
published_at 2026-04-04T12:55:00Z
3
value 0.33823
scoring_system epss
scoring_elements 0.96939
published_at 2026-04-07T12:55:00Z
4
value 0.33823
scoring_system epss
scoring_elements 0.96947
published_at 2026-04-08T12:55:00Z
5
value 0.3697
scoring_system epss
scoring_elements 0.9715
published_at 2026-04-09T12:55:00Z
6
value 0.3697
scoring_system epss
scoring_elements 0.97154
published_at 2026-04-11T12:55:00Z
7
value 0.3697
scoring_system epss
scoring_elements 0.97155
published_at 2026-04-12T12:55:00Z
8
value 0.3697
scoring_system epss
scoring_elements 0.97156
published_at 2026-04-13T12:55:00Z
9
value 0.3697
scoring_system epss
scoring_elements 0.97163
published_at 2026-04-16T12:55:00Z
10
value 0.3697
scoring_system epss
scoring_elements 0.97165
published_at 2026-04-18T12:55:00Z
11
value 0.3697
scoring_system epss
scoring_elements 0.97169
published_at 2026-04-21T12:55:00Z
12
value 0.3697
scoring_system epss
scoring_elements 0.9717
published_at 2026-04-24T12:55:00Z
13
value 0.3697
scoring_system epss
scoring_elements 0.97171
published_at 2026-04-26T12:55:00Z
14
value 0.3697
scoring_system epss
scoring_elements 0.97173
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5426
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
purl pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1
aliases CVE-2016-5426
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gj88-me79-1qb3
10
url VCID-jrb1-cuhc-nqa1
vulnerability_id VCID-jrb1-cuhc-nqa1
summary pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1046
reference_id
reference_type
scores
0
value 2e-05
scoring_system epss
scoring_elements 0.00056
published_at 2026-04-29T12:55:00Z
1
value 2e-05
scoring_system epss
scoring_elements 0.00052
published_at 2026-04-09T12:55:00Z
2
value 2e-05
scoring_system epss
scoring_elements 0.00057
published_at 2026-04-21T12:55:00Z
3
value 2e-05
scoring_system epss
scoring_elements 0.00058
published_at 2026-04-26T12:55:00Z
4
value 2e-05
scoring_system epss
scoring_elements 0.00054
published_at 2026-04-18T12:55:00Z
5
value 2e-05
scoring_system epss
scoring_elements 0.00053
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1046
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1046
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1046
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1046
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898255
reference_id 898255
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898255
4
reference_url https://security.archlinux.org/ASA-201805-1
reference_id ASA-201805-1
reference_type
scores
url https://security.archlinux.org/ASA-201805-1
5
reference_url https://security.archlinux.org/AVG-686
reference_id AVG-686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-686
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:pdns:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:pdns:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:pdns:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1046
reference_id CVE-2018-1046
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1046
8
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
purl pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ez68-8ben-nuef
1
vulnerability VCID-m7h2-vam9-1yhn
2
vulnerability VCID-qbnt-a5xe-2bg6
3
vulnerability VCID-w3fn-hwyn-6ba7
4
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1
aliases CVE-2018-1046
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrb1-cuhc-nqa1
11
url VCID-keaf-6ca3-vkbc
vulnerability_id VCID-keaf-6ca3-vkbc
summary An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15091
reference_id
reference_type
scores
0
value 3e-05
scoring_system epss
scoring_elements 0.00069
published_at 2026-04-18T12:55:00Z
1
value 3e-05
scoring_system epss
scoring_elements 0.00071
published_at 2026-04-29T12:55:00Z
2
value 3e-05
scoring_system epss
scoring_elements 0.00072
published_at 2026-04-21T12:55:00Z
3
value 3e-05
scoring_system epss
scoring_elements 0.0007
published_at 2026-04-04T12:55:00Z
4
value 3e-05
scoring_system epss
scoring_elements 0.00068
published_at 2026-04-16T12:55:00Z
5
value 3e-05
scoring_system epss
scoring_elements 0.00073
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15091
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15091
2
reference_url https://security.archlinux.org/ASA-201711-30
reference_id ASA-201711-30
reference_type
scores
url https://security.archlinux.org/ASA-201711-30
3
reference_url https://security.archlinux.org/AVG-519
reference_id AVG-519
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-519
fixed_packages
0
url pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
purl pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ez68-8ben-nuef
1
vulnerability VCID-m7h2-vam9-1yhn
2
vulnerability VCID-qbnt-a5xe-2bg6
3
vulnerability VCID-w3fn-hwyn-6ba7
4
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1
aliases CVE-2017-15091
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-keaf-6ca3-vkbc
12
url VCID-m7h2-vam9-1yhn
vulnerability_id VCID-m7h2-vam9-1yhn
summary
An information disclosure vulnerability in PowerDNS allow remote
    attackers to obtain sensitive information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17482
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15547
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1559
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15657
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15457
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15544
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15599
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15563
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15525
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15387
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15392
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15444
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15484
published_at 2026-04-24T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.15483
published_at 2026-04-26T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15426
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17482
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17482
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970737
reference_id 970737
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970737
3
reference_url https://security.gentoo.org/glsa/202012-18
reference_id GLSA-202012-18
reference_type
scores
url https://security.gentoo.org/glsa/202012-18
4
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.4.1-1
purl pkg:deb/debian/pdns@4.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1
aliases CVE-2020-17482
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m7h2-vam9-1yhn
13
url VCID-mnn7-6732-ykdm
vulnerability_id VCID-mnn7-6732-ykdm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7072
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08299
published_at 2026-04-29T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08294
published_at 2026-04-01T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08348
published_at 2026-04-02T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08401
published_at 2026-04-04T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08322
published_at 2026-04-07T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08386
published_at 2026-04-08T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08402
published_at 2026-04-09T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08394
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08375
published_at 2026-04-12T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08359
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08252
published_at 2026-04-16T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08235
published_at 2026-04-18T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08398
published_at 2026-04-21T12:55:00Z
13
value 0.00029
scoring_system epss
scoring_elements 0.08368
published_at 2026-04-24T12:55:00Z
14
value 0.00029
scoring_system epss
scoring_elements 0.08334
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7072
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
6
reference_url https://security.archlinux.org/ASA-201701-29
reference_id ASA-201701-29
reference_type
scores
url https://security.archlinux.org/ASA-201701-29
7
reference_url https://security.archlinux.org/AVG-147
reference_id AVG-147
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-147
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
purl pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1
aliases CVE-2016-7072
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mnn7-6732-ykdm
14
url VCID-qbnt-a5xe-2bg6
vulnerability_id VCID-qbnt-a5xe-2bg6
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24697
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.31989
published_at 2026-04-29T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32361
published_at 2026-04-01T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.3251
published_at 2026-04-02T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32545
published_at 2026-04-04T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32368
published_at 2026-04-07T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32417
published_at 2026-04-08T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32444
published_at 2026-04-09T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32448
published_at 2026-04-11T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.3241
published_at 2026-04-12T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32382
published_at 2026-04-13T12:55:00Z
10
value 0.00129
scoring_system epss
scoring_elements 0.32418
published_at 2026-04-16T12:55:00Z
11
value 0.00129
scoring_system epss
scoring_elements 0.32396
published_at 2026-04-18T12:55:00Z
12
value 0.00129
scoring_system epss
scoring_elements 0.32367
published_at 2026-04-21T12:55:00Z
13
value 0.00129
scoring_system epss
scoring_elements 0.32194
published_at 2026-04-24T12:55:00Z
14
value 0.00129
scoring_system epss
scoring_elements 0.32072
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24697
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24697
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/pdns@4.4.1-1
purl pkg:deb/debian/pdns@4.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1
aliases CVE-2020-24697
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbnt-a5xe-2bg6
15
url VCID-tqpr-vezf-4ye4
vulnerability_id VCID-tqpr-vezf-4ye4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5230
reference_id
reference_type
scores
0
value 0.00177
scoring_system epss
scoring_elements 0.39134
published_at 2026-04-01T12:55:00Z
1
value 0.00177
scoring_system epss
scoring_elements 0.3932
published_at 2026-04-02T12:55:00Z
2
value 0.00177
scoring_system epss
scoring_elements 0.39343
published_at 2026-04-04T12:55:00Z
3
value 0.00177
scoring_system epss
scoring_elements 0.39257
published_at 2026-04-07T12:55:00Z
4
value 0.00177
scoring_system epss
scoring_elements 0.39312
published_at 2026-04-08T12:55:00Z
5
value 0.00177
scoring_system epss
scoring_elements 0.39329
published_at 2026-04-09T12:55:00Z
6
value 0.00177
scoring_system epss
scoring_elements 0.3934
published_at 2026-04-11T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.39302
published_at 2026-04-12T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39284
published_at 2026-04-13T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.39336
published_at 2026-04-16T12:55:00Z
10
value 0.00177
scoring_system epss
scoring_elements 0.39308
published_at 2026-04-18T12:55:00Z
11
value 0.00177
scoring_system epss
scoring_elements 0.39221
published_at 2026-04-21T12:55:00Z
12
value 0.00292
scoring_system epss
scoring_elements 0.52587
published_at 2026-04-24T12:55:00Z
13
value 0.00292
scoring_system epss
scoring_elements 0.52597
published_at 2026-04-26T12:55:00Z
14
value 0.00292
scoring_system epss
scoring_elements 0.5256
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5230
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5230
fixed_packages
0
url pkg:deb/debian/pdns@3.4.7-1~bpo8%2B1
purl pkg:deb/debian/pdns@3.4.7-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jzb-z2bs-vbeb
1
vulnerability VCID-2m6r-ztcg-gbgu
2
vulnerability VCID-37kj-yg3f-x7g3
3
vulnerability VCID-4c2u-n7p5-nfg4
4
vulnerability VCID-5efj-fcg6-cuc5
5
vulnerability VCID-8fks-8s21-b7b4
6
vulnerability VCID-bb3a-3ehq-8bhd
7
vulnerability VCID-ch2d-p2ru-23ex
8
vulnerability VCID-ez68-8ben-nuef
9
vulnerability VCID-gj88-me79-1qb3
10
vulnerability VCID-jrb1-cuhc-nqa1
11
vulnerability VCID-keaf-6ca3-vkbc
12
vulnerability VCID-m7h2-vam9-1yhn
13
vulnerability VCID-mnn7-6732-ykdm
14
vulnerability VCID-qbnt-a5xe-2bg6
15
vulnerability VCID-w3fn-hwyn-6ba7
16
vulnerability VCID-w9w8-k8h2-b7fc
17
vulnerability VCID-xmmj-hpq2-kyad
18
vulnerability VCID-xvg6-5zhw-8fdk
19
vulnerability VCID-zcxy-ae2g-3kdy
20
vulnerability VCID-zdzj-q58r-5uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.7-1~bpo8%252B1
aliases CVE-2015-5230
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqpr-vezf-4ye4
16
url VCID-w3fn-hwyn-6ba7
vulnerability_id VCID-w3fn-hwyn-6ba7
summary PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10203
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05795
published_at 2026-04-29T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05717
published_at 2026-04-21T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0575
published_at 2026-04-24T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05787
published_at 2026-04-26T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05506
published_at 2026-04-01T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05541
published_at 2026-04-02T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05578
published_at 2026-04-04T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05575
published_at 2026-04-07T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05613
published_at 2026-04-08T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05638
published_at 2026-04-09T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05611
published_at 2026-04-11T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05602
published_at 2026-04-12T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05595
published_at 2026-04-13T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05545
published_at 2026-04-16T12:55:00Z
14
value 0.00021
scoring_system epss
scoring_elements 0.05559
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10203
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10203
3
reference_url https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-06.html
reference_id
reference_type
scores
url https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-06.html
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970729
reference_id 970729
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970729
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10203
reference_id CVE-2019-10203
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-10203
fixed_packages
0
url pkg:deb/debian/pdns@4.4.1-1
purl pkg:deb/debian/pdns@4.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1
aliases CVE-2019-10203
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w3fn-hwyn-6ba7
17
url VCID-w9w8-k8h2-b7fc
vulnerability_id VCID-w9w8-k8h2-b7fc
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00022.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3871
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09193
published_at 2026-04-29T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09071
published_at 2026-04-18T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09226
published_at 2026-04-21T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09272
published_at 2026-04-24T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09218
published_at 2026-04-26T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09152
published_at 2026-04-01T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09156
published_at 2026-04-02T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09207
published_at 2026-04-04T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.0913
published_at 2026-04-07T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09211
published_at 2026-04-08T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09239
published_at 2026-04-09T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09242
published_at 2026-04-11T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.0921
published_at 2026-04-12T12:55:00Z
13
value 0.00032
scoring_system epss
scoring_elements 0.09196
published_at 2026-04-13T12:55:00Z
14
value 0.00032
scoring_system epss
scoring_elements 0.09091
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3871
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3871
4
reference_url https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html
reference_id
reference_type
scores
url https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00039.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00039.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWUHF6MRSQ3YO7UUISGLV7MXCAGBW2VD/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWUHF6MRSQ3YO7UUISGLV7MXCAGBW2VD/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROFI6OTWF4GKONNSNEDUCW6LVSSEBZNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROFI6OTWF4GKONNSNEDUCW6LVSSEBZNF/
9
reference_url https://seclists.org/bugtraq/2019/Apr/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/8
10
reference_url https://www.debian.org/security/2019/dsa-4424
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4424
11
reference_url http://www.openwall.com/lists/oss-security/2019/03/18/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/03/18/4
12
reference_url http://www.securityfocus.com/bid/107491
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107491
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924966
reference_id 924966
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924966
14
reference_url https://security.archlinux.org/ASA-201903-13
reference_id ASA-201903-13
reference_type
scores
url https://security.archlinux.org/ASA-201903-13
15
reference_url https://security.archlinux.org/AVG-927
reference_id AVG-927
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-927
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3871
reference_id CVE-2019-3871
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
2
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3871
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1%2Bdeb9u5
purl pkg:deb/debian/pdns@4.0.3-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1%252Bdeb9u5
1
url pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
purl pkg:deb/debian/pdns@4.1.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ez68-8ben-nuef
1
vulnerability VCID-m7h2-vam9-1yhn
2
vulnerability VCID-qbnt-a5xe-2bg6
3
vulnerability VCID-w3fn-hwyn-6ba7
4
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%252Bdeb10u1
aliases CVE-2019-3871
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w9w8-k8h2-b7fc
18
url VCID-xmmj-hpq2-kyad
vulnerability_id VCID-xmmj-hpq2-kyad
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6172
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.0268
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02768
published_at 2026-04-04T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02773
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02776
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02795
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02766
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02748
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02743
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02753
published_at 2026-04-02T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04986
published_at 2026-04-16T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05207
published_at 2026-04-26T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05209
published_at 2026-04-29T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05166
published_at 2026-04-24T12:55:00Z
13
value 0.00019
scoring_system epss
scoring_elements 0.04992
published_at 2026-04-18T12:55:00Z
14
value 0.00019
scoring_system epss
scoring_elements 0.05139
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6172
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830808
reference_id 830808
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830808
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
purl pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1
aliases CVE-2016-6172
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xmmj-hpq2-kyad
19
url VCID-xvg6-5zhw-8fdk
vulnerability_id VCID-xvg6-5zhw-8fdk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2120
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32203
published_at 2026-04-29T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32574
published_at 2026-04-01T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32709
published_at 2026-04-02T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32744
published_at 2026-04-04T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32565
published_at 2026-04-07T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32613
published_at 2026-04-16T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32639
published_at 2026-04-09T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32641
published_at 2026-04-11T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32603
published_at 2026-04-12T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32575
published_at 2026-04-13T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.3259
published_at 2026-04-18T12:55:00Z
11
value 0.00131
scoring_system epss
scoring_elements 0.32559
published_at 2026-04-21T12:55:00Z
12
value 0.00131
scoring_system epss
scoring_elements 0.32402
published_at 2026-04-24T12:55:00Z
13
value 0.00131
scoring_system epss
scoring_elements 0.32287
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2120
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
6
reference_url https://security.archlinux.org/ASA-201701-29
reference_id ASA-201701-29
reference_type
scores
url https://security.archlinux.org/ASA-201701-29
7
reference_url https://security.archlinux.org/AVG-147
reference_id AVG-147
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-147
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
purl pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1
aliases CVE-2016-2120
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xvg6-5zhw-8fdk
20
url VCID-zcxy-ae2g-3kdy
vulnerability_id VCID-zcxy-ae2g-3kdy
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24698
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09628
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09694
published_at 2026-04-02T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09745
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09649
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.0972
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09769
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09782
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.0975
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09734
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.0962
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09592
published_at 2026-04-18T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09737
published_at 2026-04-21T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.0978
published_at 2026-04-24T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09747
published_at 2026-04-26T12:55:00Z
14
value 0.00033
scoring_system epss
scoring_elements 0.09706
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24698
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24698
fixed_packages
0
url pkg:deb/debian/pdns@4.4.1-1
purl pkg:deb/debian/pdns@4.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1
aliases CVE-2020-24698
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxy-ae2g-3kdy
21
url VCID-zdzj-q58r-5uby
vulnerability_id VCID-zdzj-q58r-5uby
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7074
reference_id
reference_type
scores
0
value 4e-05
scoring_system epss
scoring_elements 0.00166
published_at 2026-04-29T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00169
published_at 2026-04-26T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.00161
published_at 2026-04-02T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00162
published_at 2026-04-08T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00163
published_at 2026-04-13T12:55:00Z
5
value 4e-05
scoring_system epss
scoring_elements 0.00164
published_at 2026-04-12T12:55:00Z
6
value 4e-05
scoring_system epss
scoring_elements 0.00165
published_at 2026-04-18T12:55:00Z
7
value 4e-05
scoring_system epss
scoring_elements 0.00168
published_at 2026-04-21T12:55:00Z
8
value 4e-05
scoring_system epss
scoring_elements 0.0017
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7074
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
6
reference_url https://security.archlinux.org/ASA-201701-29
reference_id ASA-201701-29
reference_type
scores
url https://security.archlinux.org/ASA-201701-29
7
reference_url https://security.archlinux.org/ASA-201701-30
reference_id ASA-201701-30
reference_type
scores
url https://security.archlinux.org/ASA-201701-30
8
reference_url https://security.archlinux.org/AVG-147
reference_id AVG-147
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-147
9
reference_url https://security.archlinux.org/AVG-148
reference_id AVG-148
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-148
fixed_packages
0
url pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
purl pkg:deb/debian/pdns@4.0.3-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4c2u-n7p5-nfg4
1
vulnerability VCID-5efj-fcg6-cuc5
2
vulnerability VCID-8fks-8s21-b7b4
3
vulnerability VCID-ch2d-p2ru-23ex
4
vulnerability VCID-ez68-8ben-nuef
5
vulnerability VCID-jrb1-cuhc-nqa1
6
vulnerability VCID-keaf-6ca3-vkbc
7
vulnerability VCID-m7h2-vam9-1yhn
8
vulnerability VCID-qbnt-a5xe-2bg6
9
vulnerability VCID-w3fn-hwyn-6ba7
10
vulnerability VCID-w9w8-k8h2-b7fc
11
vulnerability VCID-zcxy-ae2g-3kdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.3-1~bpo8%252B1
aliases CVE-2016-7074
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdzj-q58r-5uby
Fixing_vulnerabilities
0
url VCID-nwfa-n5f2-abe7
vulnerability_id VCID-nwfa-n5f2-abe7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5470
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.0045
published_at 2026-04-29T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00435
published_at 2026-04-01T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00439
published_at 2026-04-04T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00431
published_at 2026-04-07T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00428
published_at 2026-04-08T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.0043
published_at 2026-04-11T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00425
published_at 2026-04-18T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00424
published_at 2026-04-13T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00421
published_at 2026-04-16T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00455
published_at 2026-04-26T12:55:00Z
10
value 6e-05
scoring_system epss
scoring_elements 0.00453
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5470
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5470
2
reference_url https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
reference_id
reference_type
scores
url https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
3
reference_url http://www.openwall.com/lists/oss-security/2015/07/07/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/07/07/6
4
reference_url http://www.openwall.com/lists/oss-security/2015/07/10/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/07/10/8
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5470
reference_id CVE-2015-5470
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-5470
fixed_packages
0
url pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8
purl pkg:deb/debian/pdns@3.4.1-4%2Bdeb8u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jzb-z2bs-vbeb
1
vulnerability VCID-2m6r-ztcg-gbgu
2
vulnerability VCID-37kj-yg3f-x7g3
3
vulnerability VCID-4c2u-n7p5-nfg4
4
vulnerability VCID-5efj-fcg6-cuc5
5
vulnerability VCID-8fks-8s21-b7b4
6
vulnerability VCID-bb3a-3ehq-8bhd
7
vulnerability VCID-ch2d-p2ru-23ex
8
vulnerability VCID-d13q-prqh-buge
9
vulnerability VCID-ez68-8ben-nuef
10
vulnerability VCID-gj88-me79-1qb3
11
vulnerability VCID-jrb1-cuhc-nqa1
12
vulnerability VCID-keaf-6ca3-vkbc
13
vulnerability VCID-m7h2-vam9-1yhn
14
vulnerability VCID-mnn7-6732-ykdm
15
vulnerability VCID-nwfa-n5f2-abe7
16
vulnerability VCID-qbnt-a5xe-2bg6
17
vulnerability VCID-tqpr-vezf-4ye4
18
vulnerability VCID-w3fn-hwyn-6ba7
19
vulnerability VCID-w9w8-k8h2-b7fc
20
vulnerability VCID-xmmj-hpq2-kyad
21
vulnerability VCID-xvg6-5zhw-8fdk
22
vulnerability VCID-zcxy-ae2g-3kdy
23
vulnerability VCID-zdzj-q58r-5uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.1-4%252Bdeb8u8
1
url pkg:deb/debian/pdns@3.4.6-1~bpo7%2B1
purl pkg:deb/debian/pdns@3.4.6-1~bpo7%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jzb-z2bs-vbeb
1
vulnerability VCID-2m6r-ztcg-gbgu
2
vulnerability VCID-37kj-yg3f-x7g3
3
vulnerability VCID-4c2u-n7p5-nfg4
4
vulnerability VCID-5efj-fcg6-cuc5
5
vulnerability VCID-8fks-8s21-b7b4
6
vulnerability VCID-bb3a-3ehq-8bhd
7
vulnerability VCID-ch2d-p2ru-23ex
8
vulnerability VCID-ez68-8ben-nuef
9
vulnerability VCID-gj88-me79-1qb3
10
vulnerability VCID-jrb1-cuhc-nqa1
11
vulnerability VCID-keaf-6ca3-vkbc
12
vulnerability VCID-m7h2-vam9-1yhn
13
vulnerability VCID-mnn7-6732-ykdm
14
vulnerability VCID-qbnt-a5xe-2bg6
15
vulnerability VCID-tqpr-vezf-4ye4
16
vulnerability VCID-w3fn-hwyn-6ba7
17
vulnerability VCID-w9w8-k8h2-b7fc
18
vulnerability VCID-xmmj-hpq2-kyad
19
vulnerability VCID-xvg6-5zhw-8fdk
20
vulnerability VCID-zcxy-ae2g-3kdy
21
vulnerability VCID-zdzj-q58r-5uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.6-1~bpo7%252B1
aliases CVE-2015-5470
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfa-n5f2-abe7
Risk_score4.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.6-1~bpo7%252B1