Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/pdns@4.4.1-1
Typedeb
Namespacedebian
Namepdns
Version4.4.1-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.9.7-1
Latest_non_vulnerable_version5.0.4-1
Affected_by_vulnerabilities
0
url VCID-6pjd-r9ca-rbgg
vulnerability_id VCID-6pjd-r9ca-rbgg
summary An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33611
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06334
published_at 2026-05-14T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00208
published_at 2026-04-26T12:55:00Z
2
value 5e-05
scoring_system epss
scoring_elements 0.00272
published_at 2026-05-11T12:55:00Z
3
value 5e-05
scoring_system epss
scoring_elements 0.00274
published_at 2026-05-07T12:55:00Z
4
value 5e-05
scoring_system epss
scoring_elements 0.00275
published_at 2026-05-09T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.00269
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33611
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33611
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
reference_id 1135373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
3
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
reference_id powerdns-advisory-powerdns-2026-05.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:24:04Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1
purl pkg:deb/debian/pdns@4.9.7-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1
1
url pkg:deb/debian/pdns@5.0.4-1
purl pkg:deb/debian/pdns@5.0.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.4-1
aliases CVE-2026-33611
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pjd-r9ca-rbgg
1
url VCID-6uz8-kz5m-8ya9
vulnerability_id VCID-6uz8-kz5m-8ya9
summary An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33608
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00289
published_at 2026-04-24T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00354
published_at 2026-04-26T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00548
published_at 2026-05-12T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00555
published_at 2026-05-09T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00551
published_at 2026-05-14T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00557
published_at 2026-04-29T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00564
published_at 2026-05-05T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00562
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33608
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33608
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
reference_id 1135373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
3
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
reference_id powerdns-advisory-powerdns-2026-05.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:28:03Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1
purl pkg:deb/debian/pdns@4.9.7-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1
1
url pkg:deb/debian/pdns@5.0.4-1
purl pkg:deb/debian/pdns@5.0.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.4-1
aliases CVE-2026-33608
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6uz8-kz5m-8ya9
2
url VCID-7dc3-qdk8-k7b2
vulnerability_id VCID-7dc3-qdk8-k7b2
summary In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27227
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07689
published_at 2026-05-14T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07652
published_at 2026-05-09T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07627
published_at 2026-05-11T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07648
published_at 2026-05-12T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07406
published_at 2026-04-16T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07449
published_at 2026-04-04T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.0743
published_at 2026-04-07T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-08T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.0751
published_at 2026-04-11T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07496
published_at 2026-04-12T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07484
published_at 2026-04-13T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07393
published_at 2026-04-18T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07522
published_at 2026-04-21T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07482
published_at 2026-04-24T12:55:00Z
14
value 0.00027
scoring_system epss
scoring_elements 0.07471
published_at 2026-04-26T12:55:00Z
15
value 0.00027
scoring_system epss
scoring_elements 0.07439
published_at 2026-04-29T12:55:00Z
16
value 0.00027
scoring_system epss
scoring_elements 0.07437
published_at 2026-05-05T12:55:00Z
17
value 0.00027
scoring_system epss
scoring_elements 0.07584
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27227
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27227
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.archlinux.org/AVG-2655
reference_id AVG-2655
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2655
4
reference_url https://security.archlinux.org/AVG-2656
reference_id AVG-2656
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2656
5
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.7.3-2
purl pkg:deb/debian/pdns@4.7.3-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2
aliases CVE-2022-27227
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7dc3-qdk8-k7b2
3
url VCID-chzq-qej6-rkdq
vulnerability_id VCID-chzq-qej6-rkdq
summary An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33257
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01593
published_at 2026-05-14T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01614
published_at 2026-04-29T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01581
published_at 2026-05-12T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01586
published_at 2026-05-11T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01588
published_at 2026-05-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01592
published_at 2026-05-07T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01597
published_at 2026-05-05T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00992
published_at 2026-04-26T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00988
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33257
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33257
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
reference_id 1135373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
4
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html
reference_id powerdns-advisory-2026-05.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:48Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html
5
reference_url https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html
reference_id powerdns-advisory-for-dnsdist-2026-04.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:48Z/
url https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html
6
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
reference_id powerdns-advisory-powerdns-2026-03.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:48Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1
purl pkg:deb/debian/pdns@4.9.7-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1
1
url pkg:deb/debian/pdns@5.0.4-1
purl pkg:deb/debian/pdns@5.0.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.4-1
aliases CVE-2026-33257
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chzq-qej6-rkdq
4
url VCID-g4df-vh2e-abch
vulnerability_id VCID-g4df-vh2e-abch
summary Incomplete escaping of LDAP queries when running with 8bit-dns enabled allows users to perform queries of internal domain subtrees.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33609
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00791
published_at 2026-05-12T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.008
published_at 2026-05-14T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00796
published_at 2026-05-11T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00747
published_at 2026-04-24T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00793
published_at 2026-04-26T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00805
published_at 2026-04-29T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.0081
published_at 2026-05-05T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00808
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33609
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33609
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
reference_id 1135373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
3
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
reference_id powerdns-advisory-powerdns-2026-05.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:26:43Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1
purl pkg:deb/debian/pdns@4.9.7-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1
1
url pkg:deb/debian/pdns@5.0.4-1
purl pkg:deb/debian/pdns@5.0.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.4-1
aliases CVE-2026-33609
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4df-vh2e-abch
5
url VCID-pfhu-1qdf-p7d5
vulnerability_id VCID-pfhu-1qdf-p7d5
summary An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33260
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01593
published_at 2026-05-14T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01614
published_at 2026-04-29T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01581
published_at 2026-05-12T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01586
published_at 2026-05-11T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01588
published_at 2026-05-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01592
published_at 2026-05-07T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01597
published_at 2026-05-05T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00992
published_at 2026-04-26T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00988
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33260
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33260
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
reference_id 1135373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
4
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html
reference_id powerdns-advisory-2026-05.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:50Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html
5
reference_url https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html
reference_id powerdns-advisory-for-dnsdist-2026-04.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:50Z/
url https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html
6
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
reference_id powerdns-advisory-powerdns-2026-03.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:50Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1
purl pkg:deb/debian/pdns@4.9.7-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1
1
url pkg:deb/debian/pdns@5.0.4-1
purl pkg:deb/debian/pdns@5.0.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.4-1
aliases CVE-2026-33260
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pfhu-1qdf-p7d5
6
url VCID-xa6z-cw1x-7qba
vulnerability_id VCID-xa6z-cw1x-7qba
summary A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33610
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03551
published_at 2026-04-24T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04027
published_at 2026-04-26T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05636
published_at 2026-05-14T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05631
published_at 2026-05-11T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05633
published_at 2026-05-12T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05501
published_at 2026-04-29T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05502
published_at 2026-05-05T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05546
published_at 2026-05-07T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05623
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33610
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33610
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
reference_id 1135373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135373
3
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
reference_id powerdns-advisory-powerdns-2026-05.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:25:29Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1
purl pkg:deb/debian/pdns@4.9.7-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1
1
url pkg:deb/debian/pdns@5.0.4-1
purl pkg:deb/debian/pdns@5.0.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.4-1
aliases CVE-2026-33610
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xa6z-cw1x-7qba
Fixing_vulnerabilities
0
url VCID-ez68-8ben-nuef
vulnerability_id VCID-ez68-8ben-nuef
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24696
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22579
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22751
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22795
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22586
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22662
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22713
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22732
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22693
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22636
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22652
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22649
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.226
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22446
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22436
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22434
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22337
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22423
published_at 2026-05-07T12:55:00Z
17
value 0.00075
scoring_system epss
scoring_elements 0.22499
published_at 2026-05-09T12:55:00Z
18
value 0.00075
scoring_system epss
scoring_elements 0.22467
published_at 2026-05-11T12:55:00Z
19
value 0.00075
scoring_system epss
scoring_elements 0.22483
published_at 2026-05-12T12:55:00Z
20
value 0.00075
scoring_system epss
scoring_elements 0.2256
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24696
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24696
fixed_packages
0
url pkg:deb/debian/pdns@4.4.1-1
purl pkg:deb/debian/pdns@4.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1
aliases CVE-2020-24696
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ez68-8ben-nuef
1
url VCID-m7h2-vam9-1yhn
vulnerability_id VCID-m7h2-vam9-1yhn
summary
An information disclosure vulnerability in PowerDNS allow remote
    attackers to obtain sensitive information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17482
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15547
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1559
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15657
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15457
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15544
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15599
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15563
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15525
published_at 2026-05-09T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15387
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15392
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15444
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15484
published_at 2026-04-24T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.15483
published_at 2026-04-26T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15426
published_at 2026-04-29T12:55:00Z
15
value 0.0005
scoring_system epss
scoring_elements 0.15297
published_at 2026-05-05T12:55:00Z
16
value 0.0005
scoring_system epss
scoring_elements 0.1542
published_at 2026-05-07T12:55:00Z
17
value 0.0005
scoring_system epss
scoring_elements 0.15502
published_at 2026-05-11T12:55:00Z
18
value 0.0005
scoring_system epss
scoring_elements 0.15543
published_at 2026-05-12T12:55:00Z
19
value 0.0005
scoring_system epss
scoring_elements 0.15619
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17482
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17482
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970737
reference_id 970737
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970737
3
reference_url https://security.gentoo.org/glsa/202012-18
reference_id GLSA-202012-18
reference_type
scores
url https://security.gentoo.org/glsa/202012-18
4
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.4.1-1
purl pkg:deb/debian/pdns@4.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1
aliases CVE-2020-17482
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m7h2-vam9-1yhn
2
url VCID-qbnt-a5xe-2bg6
vulnerability_id VCID-qbnt-a5xe-2bg6
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24697
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.31927
published_at 2026-05-14T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32361
published_at 2026-04-01T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.3251
published_at 2026-04-02T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32545
published_at 2026-04-04T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32368
published_at 2026-04-07T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32417
published_at 2026-04-08T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32444
published_at 2026-04-09T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32448
published_at 2026-04-11T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.3241
published_at 2026-04-12T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32382
published_at 2026-04-13T12:55:00Z
10
value 0.00129
scoring_system epss
scoring_elements 0.32418
published_at 2026-04-16T12:55:00Z
11
value 0.00129
scoring_system epss
scoring_elements 0.32396
published_at 2026-04-18T12:55:00Z
12
value 0.00129
scoring_system epss
scoring_elements 0.32367
published_at 2026-04-21T12:55:00Z
13
value 0.00129
scoring_system epss
scoring_elements 0.32194
published_at 2026-04-24T12:55:00Z
14
value 0.00129
scoring_system epss
scoring_elements 0.32072
published_at 2026-04-26T12:55:00Z
15
value 0.00129
scoring_system epss
scoring_elements 0.31989
published_at 2026-04-29T12:55:00Z
16
value 0.00129
scoring_system epss
scoring_elements 0.31846
published_at 2026-05-05T12:55:00Z
17
value 0.00129
scoring_system epss
scoring_elements 0.31918
published_at 2026-05-07T12:55:00Z
18
value 0.00129
scoring_system epss
scoring_elements 0.31926
published_at 2026-05-09T12:55:00Z
19
value 0.00129
scoring_system epss
scoring_elements 0.31833
published_at 2026-05-11T12:55:00Z
20
value 0.00129
scoring_system epss
scoring_elements 0.31856
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24697
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24697
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/pdns@4.4.1-1
purl pkg:deb/debian/pdns@4.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1
aliases CVE-2020-24697
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbnt-a5xe-2bg6
3
url VCID-w3fn-hwyn-6ba7
vulnerability_id VCID-w3fn-hwyn-6ba7
summary PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10203
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05967
published_at 2026-05-14T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05947
published_at 2026-05-09T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05958
published_at 2026-05-11T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05961
published_at 2026-05-12T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05506
published_at 2026-04-01T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05541
published_at 2026-04-02T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05578
published_at 2026-04-04T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05575
published_at 2026-04-07T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05613
published_at 2026-04-08T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05638
published_at 2026-04-09T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05611
published_at 2026-04-11T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05602
published_at 2026-04-12T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05595
published_at 2026-04-13T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05545
published_at 2026-04-16T12:55:00Z
14
value 0.00021
scoring_system epss
scoring_elements 0.05559
published_at 2026-04-18T12:55:00Z
15
value 0.00021
scoring_system epss
scoring_elements 0.05717
published_at 2026-04-21T12:55:00Z
16
value 0.00021
scoring_system epss
scoring_elements 0.0575
published_at 2026-04-24T12:55:00Z
17
value 0.00021
scoring_system epss
scoring_elements 0.05787
published_at 2026-04-26T12:55:00Z
18
value 0.00021
scoring_system epss
scoring_elements 0.05795
published_at 2026-04-29T12:55:00Z
19
value 0.00021
scoring_system epss
scoring_elements 0.05805
published_at 2026-05-05T12:55:00Z
20
value 0.00021
scoring_system epss
scoring_elements 0.05882
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10203
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10203
3
reference_url https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-06.html
reference_id
reference_type
scores
url https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-06.html
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970729
reference_id 970729
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970729
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10203
reference_id CVE-2019-10203
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-10203
fixed_packages
0
url pkg:deb/debian/pdns@4.4.1-1
purl pkg:deb/debian/pdns@4.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1
aliases CVE-2019-10203
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w3fn-hwyn-6ba7
4
url VCID-zcxy-ae2g-3kdy
vulnerability_id VCID-zcxy-ae2g-3kdy
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24698
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09628
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09694
published_at 2026-04-02T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09745
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09649
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.0972
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09769
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09782
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.0975
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09734
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.0962
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09592
published_at 2026-04-18T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09737
published_at 2026-04-21T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.0978
published_at 2026-04-24T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09747
published_at 2026-04-26T12:55:00Z
14
value 0.00033
scoring_system epss
scoring_elements 0.09706
published_at 2026-04-29T12:55:00Z
15
value 0.00033
scoring_system epss
scoring_elements 0.09619
published_at 2026-05-05T12:55:00Z
16
value 0.00033
scoring_system epss
scoring_elements 0.09785
published_at 2026-05-07T12:55:00Z
17
value 0.00033
scoring_system epss
scoring_elements 0.0985
published_at 2026-05-09T12:55:00Z
18
value 0.00033
scoring_system epss
scoring_elements 0.09824
published_at 2026-05-11T12:55:00Z
19
value 0.00033
scoring_system epss
scoring_elements 0.0986
published_at 2026-05-12T12:55:00Z
20
value 0.00033
scoring_system epss
scoring_elements 0.09926
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24698
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24698
fixed_packages
0
url pkg:deb/debian/pdns@4.4.1-1
purl pkg:deb/debian/pdns@4.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1
aliases CVE-2020-24698
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxy-ae2g-3kdy
Risk_score1.9
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1