Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/dnsdist@1.1.0-2%2Bdeb9u1
Typedeb
Namespacedebian
Namednsdist
Version1.1.0-2+deb9u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.3.3-3
Latest_non_vulnerable_version1.9.14-0+deb13u1
Affected_by_vulnerabilities
0
url VCID-8bsm-ve4h-cbeb
vulnerability_id VCID-8bsm-ve4h-cbeb
summary dnsdist version 1.1.0 is vulnerable to a flaw in authentication mechanism for REST API potentially allowing CSRF attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7557
reference_id
reference_type
scores
0
value 3e-05
scoring_system epss
scoring_elements 0.00092
published_at 2026-04-01T12:55:00Z
1
value 3e-05
scoring_system epss
scoring_elements 0.00093
published_at 2026-04-02T12:55:00Z
2
value 3e-05
scoring_system epss
scoring_elements 0.0009
published_at 2026-04-09T12:55:00Z
3
value 3e-05
scoring_system epss
scoring_elements 0.00089
published_at 2026-04-08T12:55:00Z
4
value 3e-05
scoring_system epss
scoring_elements 0.00091
published_at 2026-04-21T12:55:00Z
5
value 3e-05
scoring_system epss
scoring_elements 0.00088
published_at 2026-04-18T12:55:00Z
6
value 4e-05
scoring_system epss
scoring_elements 0.00152
published_at 2026-04-26T12:55:00Z
7
value 4e-05
scoring_system epss
scoring_elements 0.00149
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7557
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7557
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872854
reference_id 872854
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872854
fixed_packages
0
url pkg:deb/debian/dnsdist@1.3.3-3
purl pkg:deb/debian/dnsdist@1.3.3-3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnsdist@1.3.3-3
aliases CVE-2017-7557
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8bsm-ve4h-cbeb
1
url VCID-ggta-dn3b-d3dd
vulnerability_id VCID-ggta-dn3b-d3dd
summary An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7069
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03686
published_at 2026-04-01T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03737
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03749
published_at 2026-04-04T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03763
published_at 2026-04-07T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03766
published_at 2026-04-08T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.0379
published_at 2026-04-09T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03751
published_at 2026-04-11T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03731
published_at 2026-04-12T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03704
published_at 2026-04-13T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03681
published_at 2026-04-16T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03692
published_at 2026-04-18T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03812
published_at 2026-04-21T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05889
published_at 2026-04-24T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05925
published_at 2026-04-26T12:55:00Z
14
value 0.00021
scoring_system epss
scoring_elements 0.05935
published_at 2026-04-29T12:55:00Z
15
value 0.00021
scoring_system epss
scoring_elements 0.0595
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7069
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7069
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872854
reference_id 872854
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872854
fixed_packages
0
url pkg:deb/debian/dnsdist@1.3.3-3
purl pkg:deb/debian/dnsdist@1.3.3-3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnsdist@1.3.3-3
aliases CVE-2016-7069
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ggta-dn3b-d3dd
2
url VCID-vf4m-5c4v-suce
vulnerability_id VCID-vf4m-5c4v-suce
summary An issue has been found in PowerDNS DNSDist before 1.3.3 allowing a remote attacker to craft a DNS query with trailing data such that the addition of a record by dnsdist, for example an OPT record when adding EDNS Client Subnet, might result in the trailing data being smuggled to the backend as a valid record while not seen by dnsdist. This is an issue when dnsdist is deployed as a DNS Firewall and used to filter some records that should not be received by the backend. This issue occurs only when either the 'useClientSubnet' or the experimental 'addXPF' parameters are used when declaring a new backend.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14663
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03771
published_at 2026-04-01T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03811
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03824
published_at 2026-04-04T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03839
published_at 2026-04-07T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03844
published_at 2026-04-08T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03868
published_at 2026-04-09T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03831
published_at 2026-04-11T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03812
published_at 2026-04-12T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03785
published_at 2026-04-13T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03765
published_at 2026-04-16T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03776
published_at 2026-04-18T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.039
published_at 2026-04-21T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03911
published_at 2026-04-24T12:55:00Z
13
value 0.00016
scoring_system epss
scoring_elements 0.03914
published_at 2026-04-26T12:55:00Z
14
value 0.00016
scoring_system epss
scoring_elements 0.0396
published_at 2026-04-29T12:55:00Z
15
value 0.00016
scoring_system epss
scoring_elements 0.03913
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14663
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14663
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913231
reference_id 913231
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913231
fixed_packages
0
url pkg:deb/debian/dnsdist@1.3.3-3
purl pkg:deb/debian/dnsdist@1.3.3-3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnsdist@1.3.3-3
aliases CVE-2018-14663
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vf4m-5c4v-suce
Fixing_vulnerabilities
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/dnsdist@1.1.0-2%252Bdeb9u1