Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/pdns@4.7.3-2 |
| Type | deb |
| Namespace | debian |
| Name | pdns |
| Version | 4.7.3-2 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 4.9.7-1 |
| Latest_non_vulnerable_version | 4.9.7-1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-6pjd-r9ca-rbgg |
| vulnerability_id |
VCID-6pjd-r9ca-rbgg |
| summary |
An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend. |
| references |
|
| fixed_packages |
|
| aliases |
CVE-2026-33611
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6pjd-r9ca-rbgg |
|
| 1 |
| url |
VCID-6uz8-kz5m-8ya9 |
| vulnerability_id |
VCID-6uz8-kz5m-8ya9 |
| summary |
An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it. |
| references |
|
| fixed_packages |
|
| aliases |
CVE-2026-33608
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6uz8-kz5m-8ya9 |
|
| 2 |
| url |
VCID-chzq-qej6-rkdq |
| vulnerability_id |
VCID-chzq-qej6-rkdq |
| summary |
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default. |
| references |
|
| fixed_packages |
|
| aliases |
CVE-2026-33257
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-chzq-qej6-rkdq |
|
| 3 |
|
| 4 |
| url |
VCID-pfhu-1qdf-p7d5 |
| vulnerability_id |
VCID-pfhu-1qdf-p7d5 |
| summary |
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default. |
| references |
|
| fixed_packages |
|
| aliases |
CVE-2026-33260
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pfhu-1qdf-p7d5 |
|
| 5 |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-7dc3-qdk8-k7b2 |
| vulnerability_id |
VCID-7dc3-qdk8-k7b2 |
| summary |
In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07439 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07522 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07482 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07471 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07406 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07449 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0743 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0751 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07496 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07484 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07393 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27227 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27227
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7dc3-qdk8-k7b2 |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2 |