Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/knot-resolver@3.2.1-3
Typedeb
Namespacedebian
Nameknot-resolver
Version3.2.1-3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version5.6.0-1+deb12u1
Latest_non_vulnerable_version5.6.0-1+deb12u1
Affected_by_vulnerabilities
0
url VCID-2wu3-v2hz-q3bv
vulnerability_id VCID-2wu3-v2hz-q3bv
summary Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12667
reference_id
reference_type
scores
0
value 0.01022
scoring_system epss
scoring_elements 0.77397
published_at 2026-05-12T12:55:00Z
1
value 0.01022
scoring_system epss
scoring_elements 0.77193
published_at 2026-04-02T12:55:00Z
2
value 0.01022
scoring_system epss
scoring_elements 0.77287
published_at 2026-04-18T12:55:00Z
3
value 0.01022
scoring_system epss
scoring_elements 0.77279
published_at 2026-04-21T12:55:00Z
4
value 0.01022
scoring_system epss
scoring_elements 0.77314
published_at 2026-04-24T12:55:00Z
5
value 0.01022
scoring_system epss
scoring_elements 0.7732
published_at 2026-04-26T12:55:00Z
6
value 0.01022
scoring_system epss
scoring_elements 0.77334
published_at 2026-04-29T12:55:00Z
7
value 0.01022
scoring_system epss
scoring_elements 0.7734
published_at 2026-05-05T12:55:00Z
8
value 0.01022
scoring_system epss
scoring_elements 0.77367
published_at 2026-05-07T12:55:00Z
9
value 0.01022
scoring_system epss
scoring_elements 0.77389
published_at 2026-05-09T12:55:00Z
10
value 0.01022
scoring_system epss
scoring_elements 0.77378
published_at 2026-05-11T12:55:00Z
11
value 0.01022
scoring_system epss
scoring_elements 0.77187
published_at 2026-04-01T12:55:00Z
12
value 0.01022
scoring_system epss
scoring_elements 0.77222
published_at 2026-04-04T12:55:00Z
13
value 0.01022
scoring_system epss
scoring_elements 0.77204
published_at 2026-04-07T12:55:00Z
14
value 0.01022
scoring_system epss
scoring_elements 0.77236
published_at 2026-04-08T12:55:00Z
15
value 0.01022
scoring_system epss
scoring_elements 0.77244
published_at 2026-04-09T12:55:00Z
16
value 0.01022
scoring_system epss
scoring_elements 0.77271
published_at 2026-04-11T12:55:00Z
17
value 0.01022
scoring_system epss
scoring_elements 0.7725
published_at 2026-04-12T12:55:00Z
18
value 0.01022
scoring_system epss
scoring_elements 0.77247
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12667
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12667
2
reference_url http://cyber-security-group.cs.tau.ac.il/#
reference_id #
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T17:02:23Z/
url http://cyber-security-group.cs.tau.ac.il/#
3
reference_url http://www.openwall.com/lists/oss-security/2020/05/19/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T17:02:23Z/
url http://www.openwall.com/lists/oss-security/2020/05/19/2
4
reference_url https://www.knot-resolver.cz/2020-05-19-knot-resolver-5.1.1.html
reference_id 2020-05-19-knot-resolver-5.1.1.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T17:02:23Z/
url https://www.knot-resolver.cz/2020-05-19-knot-resolver-5.1.1.html
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76Y4FITMOH6RVPWAANGV7NB2ZHPJJGDQ/
reference_id 76Y4FITMOH6RVPWAANGV7NB2ZHPJJGDQ
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T17:02:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76Y4FITMOH6RVPWAANGV7NB2ZHPJJGDQ/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961076
reference_id 961076
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961076
7
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T17:02:23Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00017.html
8
reference_url https://en.blog.nic.cz/2020/05/19/nxnsattack-upgrade-resolvers-to-stop-new-kind-of-random-subdomain-attack/
reference_id nxnsattack-upgrade-resolvers-to-stop-new-kind-of-random-subdomain-attack
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T17:02:23Z/
url https://en.blog.nic.cz/2020/05/19/nxnsattack-upgrade-resolvers-to-stop-new-kind-of-random-subdomain-attack/
9
reference_url https://usn.ubuntu.com/7047-1/
reference_id USN-7047-1
reference_type
scores
url https://usn.ubuntu.com/7047-1/
fixed_packages
0
url pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1
purl pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-66sa-bc5p-jqde
1
vulnerability VCID-c7c5-awxv-j3de
2
vulnerability VCID-efrw-bm7j-6qgz
3
vulnerability VCID-ps4g-f1q9-wqhm
4
vulnerability VCID-vprj-j7u6-zbe7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/knot-resolver@5.3.1-1%252Bdeb11u1
aliases CVE-2020-12667
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2wu3-v2hz-q3bv
1
url VCID-8ks2-kv5d-gkdc
vulnerability_id VCID-8ks2-kv5d-gkdc
summary knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19331
reference_id
reference_type
scores
0
value 0.00489
scoring_system epss
scoring_elements 0.65416
published_at 2026-04-01T12:55:00Z
1
value 0.00489
scoring_system epss
scoring_elements 0.65465
published_at 2026-04-02T12:55:00Z
2
value 0.00489
scoring_system epss
scoring_elements 0.65492
published_at 2026-04-04T12:55:00Z
3
value 0.00489
scoring_system epss
scoring_elements 0.65457
published_at 2026-04-07T12:55:00Z
4
value 0.00489
scoring_system epss
scoring_elements 0.6551
published_at 2026-04-08T12:55:00Z
5
value 0.00489
scoring_system epss
scoring_elements 0.65521
published_at 2026-04-09T12:55:00Z
6
value 0.00489
scoring_system epss
scoring_elements 0.65539
published_at 2026-04-11T12:55:00Z
7
value 0.00489
scoring_system epss
scoring_elements 0.65526
published_at 2026-04-12T12:55:00Z
8
value 0.00489
scoring_system epss
scoring_elements 0.65499
published_at 2026-04-13T12:55:00Z
9
value 0.00489
scoring_system epss
scoring_elements 0.65534
published_at 2026-04-16T12:55:00Z
10
value 0.00489
scoring_system epss
scoring_elements 0.65546
published_at 2026-04-18T12:55:00Z
11
value 0.00489
scoring_system epss
scoring_elements 0.65531
published_at 2026-04-21T12:55:00Z
12
value 0.00489
scoring_system epss
scoring_elements 0.65547
published_at 2026-04-24T12:55:00Z
13
value 0.00489
scoring_system epss
scoring_elements 0.65558
published_at 2026-04-26T12:55:00Z
14
value 0.00489
scoring_system epss
scoring_elements 0.65556
published_at 2026-04-29T12:55:00Z
15
value 0.00489
scoring_system epss
scoring_elements 0.65532
published_at 2026-05-05T12:55:00Z
16
value 0.00489
scoring_system epss
scoring_elements 0.65579
published_at 2026-05-07T12:55:00Z
17
value 0.00489
scoring_system epss
scoring_elements 0.65624
published_at 2026-05-09T12:55:00Z
18
value 0.00489
scoring_system epss
scoring_elements 0.65595
published_at 2026-05-11T12:55:00Z
19
value 0.00489
scoring_system epss
scoring_elements 0.65615
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19331
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19331
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946181
reference_id 946181
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946181
3
reference_url https://usn.ubuntu.com/7047-1/
reference_id USN-7047-1
reference_type
scores
url https://usn.ubuntu.com/7047-1/
fixed_packages
0
url pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1
purl pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-66sa-bc5p-jqde
1
vulnerability VCID-c7c5-awxv-j3de
2
vulnerability VCID-efrw-bm7j-6qgz
3
vulnerability VCID-ps4g-f1q9-wqhm
4
vulnerability VCID-vprj-j7u6-zbe7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/knot-resolver@5.3.1-1%252Bdeb11u1
aliases CVE-2019-19331
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ks2-kv5d-gkdc
2
url VCID-fptj-ztkq-7uag
vulnerability_id VCID-fptj-ztkq-7uag
summary A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10191
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49476
published_at 2026-05-05T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49535
published_at 2026-05-07T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49565
published_at 2026-05-09T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49513
published_at 2026-05-11T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49541
published_at 2026-05-12T12:55:00Z
5
value 0.00268
scoring_system epss
scoring_elements 0.50243
published_at 2026-04-09T12:55:00Z
6
value 0.00268
scoring_system epss
scoring_elements 0.5027
published_at 2026-04-11T12:55:00Z
7
value 0.00268
scoring_system epss
scoring_elements 0.50244
published_at 2026-04-12T12:55:00Z
8
value 0.00268
scoring_system epss
scoring_elements 0.50232
published_at 2026-04-13T12:55:00Z
9
value 0.00268
scoring_system epss
scoring_elements 0.50173
published_at 2026-04-01T12:55:00Z
10
value 0.00268
scoring_system epss
scoring_elements 0.50252
published_at 2026-04-21T12:55:00Z
11
value 0.00268
scoring_system epss
scoring_elements 0.50224
published_at 2026-04-24T12:55:00Z
12
value 0.00268
scoring_system epss
scoring_elements 0.5023
published_at 2026-04-26T12:55:00Z
13
value 0.00268
scoring_system epss
scoring_elements 0.50185
published_at 2026-04-29T12:55:00Z
14
value 0.00268
scoring_system epss
scoring_elements 0.50277
published_at 2026-04-18T12:55:00Z
15
value 0.00268
scoring_system epss
scoring_elements 0.50219
published_at 2026-04-02T12:55:00Z
16
value 0.00268
scoring_system epss
scoring_elements 0.50248
published_at 2026-04-04T12:55:00Z
17
value 0.00268
scoring_system epss
scoring_elements 0.50197
published_at 2026-04-07T12:55:00Z
18
value 0.00268
scoring_system epss
scoring_elements 0.50251
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10191
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10191
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10191
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932048
reference_id 932048
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932048
3
reference_url https://usn.ubuntu.com/7047-1/
reference_id USN-7047-1
reference_type
scores
url https://usn.ubuntu.com/7047-1/
fixed_packages
0
url pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1
purl pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-66sa-bc5p-jqde
1
vulnerability VCID-c7c5-awxv-j3de
2
vulnerability VCID-efrw-bm7j-6qgz
3
vulnerability VCID-ps4g-f1q9-wqhm
4
vulnerability VCID-vprj-j7u6-zbe7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/knot-resolver@5.3.1-1%252Bdeb11u1
aliases CVE-2019-10191
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fptj-ztkq-7uag
3
url VCID-g2wb-bccm-ufhn
vulnerability_id VCID-g2wb-bccm-ufhn
summary A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10190
reference_id
reference_type
scores
0
value 0.00257
scoring_system epss
scoring_elements 0.4892
published_at 2026-05-05T12:55:00Z
1
value 0.00257
scoring_system epss
scoring_elements 0.48983
published_at 2026-05-07T12:55:00Z
2
value 0.00257
scoring_system epss
scoring_elements 0.49011
published_at 2026-05-09T12:55:00Z
3
value 0.00257
scoring_system epss
scoring_elements 0.48956
published_at 2026-05-11T12:55:00Z
4
value 0.00257
scoring_system epss
scoring_elements 0.48985
published_at 2026-05-12T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49528
published_at 2026-04-09T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49545
published_at 2026-04-11T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49516
published_at 2026-04-12T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49518
published_at 2026-04-13T12:55:00Z
9
value 0.00262
scoring_system epss
scoring_elements 0.49565
published_at 2026-04-16T12:55:00Z
10
value 0.00262
scoring_system epss
scoring_elements 0.49468
published_at 2026-04-01T12:55:00Z
11
value 0.00262
scoring_system epss
scoring_elements 0.49534
published_at 2026-04-21T12:55:00Z
12
value 0.00262
scoring_system epss
scoring_elements 0.49523
published_at 2026-04-24T12:55:00Z
13
value 0.00262
scoring_system epss
scoring_elements 0.49533
published_at 2026-04-26T12:55:00Z
14
value 0.00262
scoring_system epss
scoring_elements 0.49488
published_at 2026-04-29T12:55:00Z
15
value 0.00262
scoring_system epss
scoring_elements 0.49563
published_at 2026-04-18T12:55:00Z
16
value 0.00262
scoring_system epss
scoring_elements 0.49498
published_at 2026-04-02T12:55:00Z
17
value 0.00262
scoring_system epss
scoring_elements 0.49524
published_at 2026-04-04T12:55:00Z
18
value 0.00262
scoring_system epss
scoring_elements 0.49477
published_at 2026-04-07T12:55:00Z
19
value 0.00262
scoring_system epss
scoring_elements 0.49532
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10190
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10190
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932048
reference_id 932048
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932048
3
reference_url https://usn.ubuntu.com/7047-1/
reference_id USN-7047-1
reference_type
scores
url https://usn.ubuntu.com/7047-1/
fixed_packages
0
url pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1
purl pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-66sa-bc5p-jqde
1
vulnerability VCID-c7c5-awxv-j3de
2
vulnerability VCID-efrw-bm7j-6qgz
3
vulnerability VCID-ps4g-f1q9-wqhm
4
vulnerability VCID-vprj-j7u6-zbe7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/knot-resolver@5.3.1-1%252Bdeb11u1
aliases CVE-2019-10190
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2wb-bccm-ufhn
4
url VCID-ne61-utfg-8bgx
vulnerability_id VCID-ne61-utfg-8bgx
summary Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-40083
reference_id
reference_type
scores
0
value 0.0084
scoring_system epss
scoring_elements 0.74656
published_at 2026-04-01T12:55:00Z
1
value 0.0084
scoring_system epss
scoring_elements 0.7466
published_at 2026-04-02T12:55:00Z
2
value 0.0084
scoring_system epss
scoring_elements 0.74687
published_at 2026-04-04T12:55:00Z
3
value 0.0084
scoring_system epss
scoring_elements 0.74661
published_at 2026-04-07T12:55:00Z
4
value 0.0084
scoring_system epss
scoring_elements 0.74693
published_at 2026-04-08T12:55:00Z
5
value 0.0084
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-09T12:55:00Z
6
value 0.0084
scoring_system epss
scoring_elements 0.74731
published_at 2026-04-11T12:55:00Z
7
value 0.0084
scoring_system epss
scoring_elements 0.7471
published_at 2026-04-12T12:55:00Z
8
value 0.0084
scoring_system epss
scoring_elements 0.74702
published_at 2026-04-13T12:55:00Z
9
value 0.0084
scoring_system epss
scoring_elements 0.74739
published_at 2026-04-16T12:55:00Z
10
value 0.0084
scoring_system epss
scoring_elements 0.74747
published_at 2026-04-18T12:55:00Z
11
value 0.0084
scoring_system epss
scoring_elements 0.74737
published_at 2026-04-21T12:55:00Z
12
value 0.0084
scoring_system epss
scoring_elements 0.74773
published_at 2026-04-24T12:55:00Z
13
value 0.0084
scoring_system epss
scoring_elements 0.74779
published_at 2026-04-26T12:55:00Z
14
value 0.0084
scoring_system epss
scoring_elements 0.74782
published_at 2026-04-29T12:55:00Z
15
value 0.0084
scoring_system epss
scoring_elements 0.74784
published_at 2026-05-05T12:55:00Z
16
value 0.0084
scoring_system epss
scoring_elements 0.74816
published_at 2026-05-07T12:55:00Z
17
value 0.0084
scoring_system epss
scoring_elements 0.74841
published_at 2026-05-09T12:55:00Z
18
value 0.0084
scoring_system epss
scoring_elements 0.7481
published_at 2026-05-11T12:55:00Z
19
value 0.0084
scoring_system epss
scoring_elements 0.74829
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-40083
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40083
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991463
reference_id 991463
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991463
fixed_packages
0
url pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1
purl pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-66sa-bc5p-jqde
1
vulnerability VCID-c7c5-awxv-j3de
2
vulnerability VCID-efrw-bm7j-6qgz
3
vulnerability VCID-ps4g-f1q9-wqhm
4
vulnerability VCID-vprj-j7u6-zbe7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/knot-resolver@5.3.1-1%252Bdeb11u1
aliases CVE-2021-40083
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ne61-utfg-8bgx
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/knot-resolver@3.2.1-3