| 0 |
| url |
VCID-12cd-ky6m-qkdg |
| vulnerability_id |
VCID-12cd-ky6m-qkdg |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12244 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.25891 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26302 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26342 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26383 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26156 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26224 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26272 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26278 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26233 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26174 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26178 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26153 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26115 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26055 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2605 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26001 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12244 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3 |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3 |
|
|
| aliases |
CVE-2020-12244
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-12cd-ky6m-qkdg |
|
| 1 |
| url |
VCID-1jzb-z2bs-vbeb |
| vulnerability_id |
VCID-1jzb-z2bs-vbeb |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7073 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00446 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00443 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00433 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00435 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00434 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00426 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00423 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00419 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00418 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00414 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00445 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00447 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7073 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7073
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1jzb-z2bs-vbeb |
|
| 2 |
| url |
VCID-2hee-f8gq-rycf |
| vulnerability_id |
VCID-2hee-f8gq-rycf |
| summary |
An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3807 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00116 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00117 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00118 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00119 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3807 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-3807
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2hee-f8gq-rycf |
|
| 3 |
| url |
VCID-2m6r-ztcg-gbgu |
| vulnerability_id |
VCID-2m6r-ztcg-gbgu |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7068 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24413 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24535 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24743 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2482 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24858 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2463 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24699 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24747 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24719 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24662 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24675 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24667 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24647 |
| published_at |
2026-04-21T12:55:00Z |
|
| 14 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2459 |
| published_at |
2026-04-24T12:55:00Z |
|
| 15 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24578 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7068 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@3.6.2-2%2Bdeb8u4 |
| purl |
pkg:deb/debian/pdns-recursor@3.6.2-2%2Bdeb8u4 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12cd-ky6m-qkdg |
|
| 1 |
| vulnerability |
VCID-1jzb-z2bs-vbeb |
|
| 2 |
| vulnerability |
VCID-2hee-f8gq-rycf |
|
| 3 |
| vulnerability |
VCID-2m6r-ztcg-gbgu |
|
| 4 |
| vulnerability |
VCID-3e3b-z5bh-pban |
|
| 5 |
| vulnerability |
VCID-4c2u-n7p5-nfg4 |
|
| 6 |
| vulnerability |
VCID-9p7x-52ad-vbh6 |
|
| 7 |
| vulnerability |
VCID-a7xd-fyh3-xuaq |
|
| 8 |
| vulnerability |
VCID-ch2d-p2ru-23ex |
|
| 9 |
| vulnerability |
VCID-d13q-prqh-buge |
|
| 10 |
| vulnerability |
VCID-d4km-jg6b-2kh3 |
|
| 11 |
| vulnerability |
VCID-h73s-nkfg-sqgc |
|
| 12 |
| vulnerability |
VCID-htr2-rwgm-47ed |
|
| 13 |
| vulnerability |
VCID-mbq1-b3dr-1uc4 |
|
| 14 |
| vulnerability |
VCID-n2k6-nfxs-7ydj |
|
| 15 |
| vulnerability |
VCID-nwfa-n5f2-abe7 |
|
| 16 |
| vulnerability |
VCID-s6ds-tuus-n7hr |
|
| 17 |
| vulnerability |
VCID-tcp4-6r2n-6uer |
|
| 18 |
| vulnerability |
VCID-urr2-qrfd-vfeh |
|
| 19 |
| vulnerability |
VCID-vua1-5kz6-hban |
|
| 20 |
| vulnerability |
VCID-xxxv-krt4-tka1 |
|
| 21 |
| vulnerability |
VCID-zdzj-q58r-5uby |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@3.6.2-2%252Bdeb8u4 |
|
| 1 |
|
|
| aliases |
CVE-2016-7068
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2m6r-ztcg-gbgu |
|
| 4 |
| url |
VCID-3e3b-z5bh-pban |
| vulnerability_id |
VCID-3e3b-z5bh-pban |
| summary |
An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system's hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have '\0' termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has '\0' termination.) Under some conditions, this issue can lead to the writing of one '\0' byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10030 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08041 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08131 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08174 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08121 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0819 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08208 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08198 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08178 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08161 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08061 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08046 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08204 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08173 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08136 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08097 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08062 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10030 |
|
| 1 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3 |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3 |
|
|
| aliases |
CVE-2020-10030
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3e3b-z5bh-pban |
|
| 5 |
| url |
VCID-4532-4nm8-6qc8 |
| vulnerability_id |
VCID-4532-4nm8-6qc8 |
| summary |
Multiple vulnerabilities have been found in PowerDNS Recursor, the
worst of which may allow execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4009 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10921 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10985 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10811 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10887 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1094 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10941 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10908 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1075 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10763 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10884 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10844 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10803 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10743 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10686 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4009 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@3.2-4 |
| purl |
pkg:deb/debian/pdns-recursor@3.2-4 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12cd-ky6m-qkdg |
|
| 1 |
| vulnerability |
VCID-1jzb-z2bs-vbeb |
|
| 2 |
| vulnerability |
VCID-2hee-f8gq-rycf |
|
| 3 |
| vulnerability |
VCID-2m6r-ztcg-gbgu |
|
| 4 |
| vulnerability |
VCID-3e3b-z5bh-pban |
|
| 5 |
| vulnerability |
VCID-4c2u-n7p5-nfg4 |
|
| 6 |
| vulnerability |
VCID-9p7x-52ad-vbh6 |
|
| 7 |
| vulnerability |
VCID-a7xd-fyh3-xuaq |
|
| 8 |
| vulnerability |
VCID-ch2d-p2ru-23ex |
|
| 9 |
| vulnerability |
VCID-d13q-prqh-buge |
|
| 10 |
| vulnerability |
VCID-d4km-jg6b-2kh3 |
|
| 11 |
| vulnerability |
VCID-h73s-nkfg-sqgc |
|
| 12 |
| vulnerability |
VCID-htr2-rwgm-47ed |
|
| 13 |
| vulnerability |
VCID-mbq1-b3dr-1uc4 |
|
| 14 |
| vulnerability |
VCID-n2k6-nfxs-7ydj |
|
| 15 |
| vulnerability |
VCID-nfhz-964w-x3e7 |
|
| 16 |
| vulnerability |
VCID-nwfa-n5f2-abe7 |
|
| 17 |
| vulnerability |
VCID-rcd7-knv1-xbgd |
|
| 18 |
| vulnerability |
VCID-s6ds-tuus-n7hr |
|
| 19 |
| vulnerability |
VCID-tcp4-6r2n-6uer |
|
| 20 |
| vulnerability |
VCID-urr2-qrfd-vfeh |
|
| 21 |
| vulnerability |
VCID-vua1-5kz6-hban |
|
| 22 |
| vulnerability |
VCID-xxxv-krt4-tka1 |
|
| 23 |
| vulnerability |
VCID-zdzj-q58r-5uby |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@3.2-4 |
|
|
| aliases |
CVE-2009-4009
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4532-4nm8-6qc8 |
|
| 6 |
| url |
VCID-4c2u-n7p5-nfg4 |
| vulnerability_id |
VCID-4c2u-n7p5-nfg4 |
| summary |
PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14626 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12398 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12605 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12488 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12635 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12739 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12785 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12592 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12671 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12723 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12691 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1265 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12606 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1251 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12518 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12632 |
| published_at |
2026-04-21T12:55:00Z |
|
| 15 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12642 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14626 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14626
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4c2u-n7p5-nfg4 |
|
| 7 |
| url |
VCID-67tu-cpzn-t7ep |
| vulnerability_id |
VCID-67tu-cpzn-t7ep |
| summary |
Use of insufficient randomness in PowerDNS Recursor might lead to DNS cache
poisoning. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3217 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00189 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00184 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00185 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00186 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00183 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00187 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00188 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00191 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00192 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3217 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@3.1.7-1%2Blenny1 |
| purl |
pkg:deb/debian/pdns-recursor@3.1.7-1%2Blenny1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12cd-ky6m-qkdg |
|
| 1 |
| vulnerability |
VCID-1jzb-z2bs-vbeb |
|
| 2 |
| vulnerability |
VCID-2hee-f8gq-rycf |
|
| 3 |
| vulnerability |
VCID-2m6r-ztcg-gbgu |
|
| 4 |
| vulnerability |
VCID-3e3b-z5bh-pban |
|
| 5 |
| vulnerability |
VCID-4532-4nm8-6qc8 |
|
| 6 |
| vulnerability |
VCID-4c2u-n7p5-nfg4 |
|
| 7 |
| vulnerability |
VCID-8hf9-emba-wbdq |
|
| 8 |
| vulnerability |
VCID-9p7x-52ad-vbh6 |
|
| 9 |
| vulnerability |
VCID-a7xd-fyh3-xuaq |
|
| 10 |
| vulnerability |
VCID-ch2d-p2ru-23ex |
|
| 11 |
| vulnerability |
VCID-d13q-prqh-buge |
|
| 12 |
| vulnerability |
VCID-d4km-jg6b-2kh3 |
|
| 13 |
| vulnerability |
VCID-h73s-nkfg-sqgc |
|
| 14 |
| vulnerability |
VCID-htr2-rwgm-47ed |
|
| 15 |
| vulnerability |
VCID-mbq1-b3dr-1uc4 |
|
| 16 |
| vulnerability |
VCID-n2k6-nfxs-7ydj |
|
| 17 |
| vulnerability |
VCID-nfhz-964w-x3e7 |
|
| 18 |
| vulnerability |
VCID-nwfa-n5f2-abe7 |
|
| 19 |
| vulnerability |
VCID-rcd7-knv1-xbgd |
|
| 20 |
| vulnerability |
VCID-s6ds-tuus-n7hr |
|
| 21 |
| vulnerability |
VCID-tcp4-6r2n-6uer |
|
| 22 |
| vulnerability |
VCID-urr2-qrfd-vfeh |
|
| 23 |
| vulnerability |
VCID-vua1-5kz6-hban |
|
| 24 |
| vulnerability |
VCID-xxxv-krt4-tka1 |
|
| 25 |
| vulnerability |
VCID-zdzj-q58r-5uby |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@3.1.7-1%252Blenny1 |
|
|
| aliases |
CVE-2008-3217
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-67tu-cpzn-t7ep |
|
| 8 |
| url |
VCID-8hf9-emba-wbdq |
| vulnerability_id |
VCID-8hf9-emba-wbdq |
| summary |
Multiple vulnerabilities have been found in PowerDNS Recursor, the
worst of which may allow execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4010 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00333 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00338 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00336 |
| published_at |
2026-05-05T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00327 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00325 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00324 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00323 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00316 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00343 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00342 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00337 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4010 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@3.2-4 |
| purl |
pkg:deb/debian/pdns-recursor@3.2-4 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12cd-ky6m-qkdg |
|
| 1 |
| vulnerability |
VCID-1jzb-z2bs-vbeb |
|
| 2 |
| vulnerability |
VCID-2hee-f8gq-rycf |
|
| 3 |
| vulnerability |
VCID-2m6r-ztcg-gbgu |
|
| 4 |
| vulnerability |
VCID-3e3b-z5bh-pban |
|
| 5 |
| vulnerability |
VCID-4c2u-n7p5-nfg4 |
|
| 6 |
| vulnerability |
VCID-9p7x-52ad-vbh6 |
|
| 7 |
| vulnerability |
VCID-a7xd-fyh3-xuaq |
|
| 8 |
| vulnerability |
VCID-ch2d-p2ru-23ex |
|
| 9 |
| vulnerability |
VCID-d13q-prqh-buge |
|
| 10 |
| vulnerability |
VCID-d4km-jg6b-2kh3 |
|
| 11 |
| vulnerability |
VCID-h73s-nkfg-sqgc |
|
| 12 |
| vulnerability |
VCID-htr2-rwgm-47ed |
|
| 13 |
| vulnerability |
VCID-mbq1-b3dr-1uc4 |
|
| 14 |
| vulnerability |
VCID-n2k6-nfxs-7ydj |
|
| 15 |
| vulnerability |
VCID-nfhz-964w-x3e7 |
|
| 16 |
| vulnerability |
VCID-nwfa-n5f2-abe7 |
|
| 17 |
| vulnerability |
VCID-rcd7-knv1-xbgd |
|
| 18 |
| vulnerability |
VCID-s6ds-tuus-n7hr |
|
| 19 |
| vulnerability |
VCID-tcp4-6r2n-6uer |
|
| 20 |
| vulnerability |
VCID-urr2-qrfd-vfeh |
|
| 21 |
| vulnerability |
VCID-vua1-5kz6-hban |
|
| 22 |
| vulnerability |
VCID-xxxv-krt4-tka1 |
|
| 23 |
| vulnerability |
VCID-zdzj-q58r-5uby |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@3.2-4 |
|
|
| aliases |
CVE-2009-4010
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8hf9-emba-wbdq |
|
| 9 |
| url |
VCID-9p7x-52ad-vbh6 |
| vulnerability_id |
VCID-9p7x-52ad-vbh6 |
| summary |
An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14644 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05475 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05472 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05189 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05233 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05265 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0529 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05325 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05347 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05314 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05303 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05292 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05238 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0524 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05392 |
| published_at |
2026-04-21T12:55:00Z |
|
| 14 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05431 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14644 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14644
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9p7x-52ad-vbh6 |
|
| 10 |
| url |
VCID-a7xd-fyh3-xuaq |
| vulnerability_id |
VCID-a7xd-fyh3-xuaq |
| summary |
An issue has been found in the DNSSEC parsing code of PowerDNS Recursor from 4.0.0 up to and including 4.0.6 leading to a memory leak when parsing specially crafted DNSSEC ECDSA keys. These keys are only parsed when validation is enabled by setting dnssec to a value other than off or process-no-validate (default). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15094 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00209 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0021 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00211 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00207 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00587 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00592 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00634 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00632 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00635 |
| published_at |
2026-04-29T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0064 |
| published_at |
2026-05-05T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00595 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00591 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00593 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15094 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15094
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a7xd-fyh3-xuaq |
|
| 11 |
| url |
VCID-ch2d-p2ru-23ex |
| vulnerability_id |
VCID-ch2d-p2ru-23ex |
| summary |
PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10851 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2859 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28811 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2874 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29135 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2921 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29262 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29075 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29138 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2918 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29186 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2914 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29088 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29091 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29044 |
| published_at |
2026-04-21T12:55:00Z |
|
| 15 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28924 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10851 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10851
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ch2d-p2ru-23ex |
|
| 12 |
| url |
VCID-d13q-prqh-buge |
| vulnerability_id |
VCID-d13q-prqh-buge |
| summary |
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1868 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66161 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66202 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66229 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66198 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66259 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66279 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66266 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66235 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.6627 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66285 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66293 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66307 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66286 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1868 |
|
| 1 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@3.7.3-1~bpo8%2B1 |
| purl |
pkg:deb/debian/pdns-recursor@3.7.3-1~bpo8%2B1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12cd-ky6m-qkdg |
|
| 1 |
| vulnerability |
VCID-1jzb-z2bs-vbeb |
|
| 2 |
| vulnerability |
VCID-2hee-f8gq-rycf |
|
| 3 |
| vulnerability |
VCID-2m6r-ztcg-gbgu |
|
| 4 |
| vulnerability |
VCID-3e3b-z5bh-pban |
|
| 5 |
| vulnerability |
VCID-4c2u-n7p5-nfg4 |
|
| 6 |
| vulnerability |
VCID-9p7x-52ad-vbh6 |
|
| 7 |
| vulnerability |
VCID-a7xd-fyh3-xuaq |
|
| 8 |
| vulnerability |
VCID-ch2d-p2ru-23ex |
|
| 9 |
| vulnerability |
VCID-d4km-jg6b-2kh3 |
|
| 10 |
| vulnerability |
VCID-h73s-nkfg-sqgc |
|
| 11 |
| vulnerability |
VCID-htr2-rwgm-47ed |
|
| 12 |
| vulnerability |
VCID-mbq1-b3dr-1uc4 |
|
| 13 |
| vulnerability |
VCID-n2k6-nfxs-7ydj |
|
| 14 |
| vulnerability |
VCID-nwfa-n5f2-abe7 |
|
| 15 |
| vulnerability |
VCID-s6ds-tuus-n7hr |
|
| 16 |
| vulnerability |
VCID-tcp4-6r2n-6uer |
|
| 17 |
| vulnerability |
VCID-urr2-qrfd-vfeh |
|
| 18 |
| vulnerability |
VCID-vua1-5kz6-hban |
|
| 19 |
| vulnerability |
VCID-xxxv-krt4-tka1 |
|
| 20 |
| vulnerability |
VCID-zdzj-q58r-5uby |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@3.7.3-1~bpo8%252B1 |
|
|
| aliases |
CVE-2015-1868
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d13q-prqh-buge |
|
| 13 |
| url |
VCID-d4km-jg6b-2kh3 |
| vulnerability_id |
VCID-d4km-jg6b-2kh3 |
| summary |
An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16855 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95477 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95413 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95428 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95432 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95438 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95441 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95445 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95447 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95456 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.9546 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95464 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95466 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95467 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16855 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-16855
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d4km-jg6b-2kh3 |
|
| 14 |
| url |
VCID-h73s-nkfg-sqgc |
| vulnerability_id |
VCID-h73s-nkfg-sqgc |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15120 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.55985 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56096 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56116 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56147 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56152 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56164 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.5614 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56124 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56158 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56161 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.5613 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56056 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56077 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56053 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56006 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15120 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15120
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h73s-nkfg-sqgc |
|
| 15 |
| url |
VCID-htr2-rwgm-47ed |
| vulnerability_id |
VCID-htr2-rwgm-47ed |
| summary |
A vulnerability in PowerDNS Recursor could lead to a Denial of
Service condition. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25829 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57303 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57287 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57369 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57391 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57366 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57418 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57421 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57436 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57415 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57396 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57423 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57419 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57397 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57353 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57375 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57355 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25829 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3 |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3 |
|
|
| aliases |
CVE-2020-25829
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-htr2-rwgm-47ed |
|
| 16 |
| url |
VCID-jfe5-j391-dubt |
| vulnerability_id |
VCID-jfe5-j391-dubt |
| summary |
Use of insufficient randomness in PowerDNS Recursor might lead to DNS cache
poisoning. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1637 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07459 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07574 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07616 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07589 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07648 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07666 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07668 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07654 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07639 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07553 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07693 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07643 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0762 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07584 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0757 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1637 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@3.1.7-1%2Blenny1 |
| purl |
pkg:deb/debian/pdns-recursor@3.1.7-1%2Blenny1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12cd-ky6m-qkdg |
|
| 1 |
| vulnerability |
VCID-1jzb-z2bs-vbeb |
|
| 2 |
| vulnerability |
VCID-2hee-f8gq-rycf |
|
| 3 |
| vulnerability |
VCID-2m6r-ztcg-gbgu |
|
| 4 |
| vulnerability |
VCID-3e3b-z5bh-pban |
|
| 5 |
| vulnerability |
VCID-4532-4nm8-6qc8 |
|
| 6 |
| vulnerability |
VCID-4c2u-n7p5-nfg4 |
|
| 7 |
| vulnerability |
VCID-8hf9-emba-wbdq |
|
| 8 |
| vulnerability |
VCID-9p7x-52ad-vbh6 |
|
| 9 |
| vulnerability |
VCID-a7xd-fyh3-xuaq |
|
| 10 |
| vulnerability |
VCID-ch2d-p2ru-23ex |
|
| 11 |
| vulnerability |
VCID-d13q-prqh-buge |
|
| 12 |
| vulnerability |
VCID-d4km-jg6b-2kh3 |
|
| 13 |
| vulnerability |
VCID-h73s-nkfg-sqgc |
|
| 14 |
| vulnerability |
VCID-htr2-rwgm-47ed |
|
| 15 |
| vulnerability |
VCID-mbq1-b3dr-1uc4 |
|
| 16 |
| vulnerability |
VCID-n2k6-nfxs-7ydj |
|
| 17 |
| vulnerability |
VCID-nfhz-964w-x3e7 |
|
| 18 |
| vulnerability |
VCID-nwfa-n5f2-abe7 |
|
| 19 |
| vulnerability |
VCID-rcd7-knv1-xbgd |
|
| 20 |
| vulnerability |
VCID-s6ds-tuus-n7hr |
|
| 21 |
| vulnerability |
VCID-tcp4-6r2n-6uer |
|
| 22 |
| vulnerability |
VCID-urr2-qrfd-vfeh |
|
| 23 |
| vulnerability |
VCID-vua1-5kz6-hban |
|
| 24 |
| vulnerability |
VCID-xxxv-krt4-tka1 |
|
| 25 |
| vulnerability |
VCID-zdzj-q58r-5uby |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@3.1.7-1%252Blenny1 |
|
|
| aliases |
CVE-2008-1637
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jfe5-j391-dubt |
|
| 17 |
| url |
VCID-mbq1-b3dr-1uc4 |
| vulnerability_id |
VCID-mbq1-b3dr-1uc4 |
| summary |
A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15092 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00062 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00061 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00065 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00067 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15092 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15092
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mbq1-b3dr-1uc4 |
|
| 18 |
| url |
VCID-n2k6-nfxs-7ydj |
| vulnerability_id |
VCID-n2k6-nfxs-7ydj |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10995 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25331 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25677 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25789 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25558 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25631 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25687 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.2559 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25592 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25576 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25548 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.255 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25493 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25445 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10995 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3 |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3 |
|
|
| aliases |
CVE-2020-10995
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n2k6-nfxs-7ydj |
|
| 19 |
| url |
VCID-nfhz-964w-x3e7 |
| vulnerability_id |
VCID-nfhz-964w-x3e7 |
| summary |
Multiple vulnerabilities have been found in PowerDNS Recursor, the
worst of which may allow execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8601 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73401 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73265 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73274 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73298 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.7327 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73306 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73319 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73343 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73324 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73316 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.7336 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73368 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73394 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73407 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73405 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8601 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@3.3-3%2Bdeb7u1 |
| purl |
pkg:deb/debian/pdns-recursor@3.3-3%2Bdeb7u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12cd-ky6m-qkdg |
|
| 1 |
| vulnerability |
VCID-1jzb-z2bs-vbeb |
|
| 2 |
| vulnerability |
VCID-2hee-f8gq-rycf |
|
| 3 |
| vulnerability |
VCID-2m6r-ztcg-gbgu |
|
| 4 |
| vulnerability |
VCID-3e3b-z5bh-pban |
|
| 5 |
| vulnerability |
VCID-4c2u-n7p5-nfg4 |
|
| 6 |
| vulnerability |
VCID-9p7x-52ad-vbh6 |
|
| 7 |
| vulnerability |
VCID-a7xd-fyh3-xuaq |
|
| 8 |
| vulnerability |
VCID-ch2d-p2ru-23ex |
|
| 9 |
| vulnerability |
VCID-d13q-prqh-buge |
|
| 10 |
| vulnerability |
VCID-d4km-jg6b-2kh3 |
|
| 11 |
| vulnerability |
VCID-h73s-nkfg-sqgc |
|
| 12 |
| vulnerability |
VCID-htr2-rwgm-47ed |
|
| 13 |
| vulnerability |
VCID-mbq1-b3dr-1uc4 |
|
| 14 |
| vulnerability |
VCID-n2k6-nfxs-7ydj |
|
| 15 |
| vulnerability |
VCID-nfhz-964w-x3e7 |
|
| 16 |
| vulnerability |
VCID-nwfa-n5f2-abe7 |
|
| 17 |
| vulnerability |
VCID-rcd7-knv1-xbgd |
|
| 18 |
| vulnerability |
VCID-s6ds-tuus-n7hr |
|
| 19 |
| vulnerability |
VCID-tcp4-6r2n-6uer |
|
| 20 |
| vulnerability |
VCID-urr2-qrfd-vfeh |
|
| 21 |
| vulnerability |
VCID-vua1-5kz6-hban |
|
| 22 |
| vulnerability |
VCID-xxxv-krt4-tka1 |
|
| 23 |
| vulnerability |
VCID-zdzj-q58r-5uby |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@3.3-3%252Bdeb7u1 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@3.6.2-2 |
| purl |
pkg:deb/debian/pdns-recursor@3.6.2-2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12cd-ky6m-qkdg |
|
| 1 |
| vulnerability |
VCID-1jzb-z2bs-vbeb |
|
| 2 |
| vulnerability |
VCID-2hee-f8gq-rycf |
|
| 3 |
| vulnerability |
VCID-2m6r-ztcg-gbgu |
|
| 4 |
| vulnerability |
VCID-3e3b-z5bh-pban |
|
| 5 |
| vulnerability |
VCID-4c2u-n7p5-nfg4 |
|
| 6 |
| vulnerability |
VCID-9p7x-52ad-vbh6 |
|
| 7 |
| vulnerability |
VCID-a7xd-fyh3-xuaq |
|
| 8 |
| vulnerability |
VCID-ch2d-p2ru-23ex |
|
| 9 |
| vulnerability |
VCID-d13q-prqh-buge |
|
| 10 |
| vulnerability |
VCID-d4km-jg6b-2kh3 |
|
| 11 |
| vulnerability |
VCID-h73s-nkfg-sqgc |
|
| 12 |
| vulnerability |
VCID-htr2-rwgm-47ed |
|
| 13 |
| vulnerability |
VCID-mbq1-b3dr-1uc4 |
|
| 14 |
| vulnerability |
VCID-n2k6-nfxs-7ydj |
|
| 15 |
| vulnerability |
VCID-nwfa-n5f2-abe7 |
|
| 16 |
| vulnerability |
VCID-s6ds-tuus-n7hr |
|
| 17 |
| vulnerability |
VCID-tcp4-6r2n-6uer |
|
| 18 |
| vulnerability |
VCID-urr2-qrfd-vfeh |
|
| 19 |
| vulnerability |
VCID-vua1-5kz6-hban |
|
| 20 |
| vulnerability |
VCID-xxxv-krt4-tka1 |
|
| 21 |
| vulnerability |
VCID-zdzj-q58r-5uby |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@3.6.2-2 |
|
|
| aliases |
CVE-2014-8601
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nfhz-964w-x3e7 |
|
| 20 |
| url |
VCID-nwfa-n5f2-abe7 |
| vulnerability_id |
VCID-nwfa-n5f2-abe7 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5470 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0045 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00435 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00439 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00431 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00428 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0043 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00425 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00424 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00421 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00455 |
| published_at |
2026-05-05T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00453 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5470 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@3.6.2-2%2Bdeb8u4 |
| purl |
pkg:deb/debian/pdns-recursor@3.6.2-2%2Bdeb8u4 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12cd-ky6m-qkdg |
|
| 1 |
| vulnerability |
VCID-1jzb-z2bs-vbeb |
|
| 2 |
| vulnerability |
VCID-2hee-f8gq-rycf |
|
| 3 |
| vulnerability |
VCID-2m6r-ztcg-gbgu |
|
| 4 |
| vulnerability |
VCID-3e3b-z5bh-pban |
|
| 5 |
| vulnerability |
VCID-4c2u-n7p5-nfg4 |
|
| 6 |
| vulnerability |
VCID-9p7x-52ad-vbh6 |
|
| 7 |
| vulnerability |
VCID-a7xd-fyh3-xuaq |
|
| 8 |
| vulnerability |
VCID-ch2d-p2ru-23ex |
|
| 9 |
| vulnerability |
VCID-d13q-prqh-buge |
|
| 10 |
| vulnerability |
VCID-d4km-jg6b-2kh3 |
|
| 11 |
| vulnerability |
VCID-h73s-nkfg-sqgc |
|
| 12 |
| vulnerability |
VCID-htr2-rwgm-47ed |
|
| 13 |
| vulnerability |
VCID-mbq1-b3dr-1uc4 |
|
| 14 |
| vulnerability |
VCID-n2k6-nfxs-7ydj |
|
| 15 |
| vulnerability |
VCID-nwfa-n5f2-abe7 |
|
| 16 |
| vulnerability |
VCID-s6ds-tuus-n7hr |
|
| 17 |
| vulnerability |
VCID-tcp4-6r2n-6uer |
|
| 18 |
| vulnerability |
VCID-urr2-qrfd-vfeh |
|
| 19 |
| vulnerability |
VCID-vua1-5kz6-hban |
|
| 20 |
| vulnerability |
VCID-xxxv-krt4-tka1 |
|
| 21 |
| vulnerability |
VCID-zdzj-q58r-5uby |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@3.6.2-2%252Bdeb8u4 |
|
| 1 |
|
|
| aliases |
CVE-2015-5470
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfa-n5f2-abe7 |
|
| 21 |
| url |
VCID-rcd7-knv1-xbgd |
| vulnerability_id |
VCID-rcd7-knv1-xbgd |
| summary |
Unspecified vulnerability in PowerDNS Recursor (aka pdns_recursor) 3.6.x before 3.6.1 allows remote attackers to cause a denial of service (crash) via an unknown sequence of malformed packets. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3614 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00895 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00844 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0085 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00852 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00856 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00854 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00845 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00839 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0084 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00892 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00894 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00897 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3614 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@3.6.2-2 |
| purl |
pkg:deb/debian/pdns-recursor@3.6.2-2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12cd-ky6m-qkdg |
|
| 1 |
| vulnerability |
VCID-1jzb-z2bs-vbeb |
|
| 2 |
| vulnerability |
VCID-2hee-f8gq-rycf |
|
| 3 |
| vulnerability |
VCID-2m6r-ztcg-gbgu |
|
| 4 |
| vulnerability |
VCID-3e3b-z5bh-pban |
|
| 5 |
| vulnerability |
VCID-4c2u-n7p5-nfg4 |
|
| 6 |
| vulnerability |
VCID-9p7x-52ad-vbh6 |
|
| 7 |
| vulnerability |
VCID-a7xd-fyh3-xuaq |
|
| 8 |
| vulnerability |
VCID-ch2d-p2ru-23ex |
|
| 9 |
| vulnerability |
VCID-d13q-prqh-buge |
|
| 10 |
| vulnerability |
VCID-d4km-jg6b-2kh3 |
|
| 11 |
| vulnerability |
VCID-h73s-nkfg-sqgc |
|
| 12 |
| vulnerability |
VCID-htr2-rwgm-47ed |
|
| 13 |
| vulnerability |
VCID-mbq1-b3dr-1uc4 |
|
| 14 |
| vulnerability |
VCID-n2k6-nfxs-7ydj |
|
| 15 |
| vulnerability |
VCID-nwfa-n5f2-abe7 |
|
| 16 |
| vulnerability |
VCID-s6ds-tuus-n7hr |
|
| 17 |
| vulnerability |
VCID-tcp4-6r2n-6uer |
|
| 18 |
| vulnerability |
VCID-urr2-qrfd-vfeh |
|
| 19 |
| vulnerability |
VCID-vua1-5kz6-hban |
|
| 20 |
| vulnerability |
VCID-xxxv-krt4-tka1 |
|
| 21 |
| vulnerability |
VCID-zdzj-q58r-5uby |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@3.6.2-2 |
|
|
| aliases |
CVE-2014-3614
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rcd7-knv1-xbgd |
|
| 22 |
| url |
VCID-s6ds-tuus-n7hr |
| vulnerability_id |
VCID-s6ds-tuus-n7hr |
| summary |
In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14196 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0685 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06837 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06566 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06634 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06679 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06714 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06748 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06747 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0674 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06733 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06664 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06655 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06812 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06817 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14196 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3 |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3 |
|
|
| aliases |
CVE-2020-14196
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s6ds-tuus-n7hr |
|
| 23 |
| url |
VCID-tcp4-6r2n-6uer |
| vulnerability_id |
VCID-tcp4-6r2n-6uer |
| summary |
When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor's ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor's configuration. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15093 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00289 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00288 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00293 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0029 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00282 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0028 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00279 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00276 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00275 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00272 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00296 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00297 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00295 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15093 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15093
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tcp4-6r2n-6uer |
|
| 24 |
| url |
VCID-urr2-qrfd-vfeh |
| vulnerability_id |
VCID-urr2-qrfd-vfeh |
| summary |
An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15090 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00048 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00051 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00049 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0005 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00052 |
| published_at |
2026-05-05T12:55:00Z |
|
| 5 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00053 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15090 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15090
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-urr2-qrfd-vfeh |
|
| 25 |
| url |
VCID-vua1-5kz6-hban |
| vulnerability_id |
VCID-vua1-5kz6-hban |
| summary |
An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3806 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06509 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06449 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06473 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06486 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0623 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06264 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06283 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0626 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06305 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06346 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06338 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06333 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06322 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06274 |
| published_at |
2026-04-16T12:55:00Z |
|
| 14 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06287 |
| published_at |
2026-04-18T12:55:00Z |
|
| 15 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06434 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3806 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-3806
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vua1-5kz6-hban |
|
| 26 |
| url |
VCID-xxxv-krt4-tka1 |
| vulnerability_id |
VCID-xxxv-krt4-tka1 |
| summary |
Improper input validation bugs in DNSSEC validators components in PowerDNS version 4.1.0 allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000003 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03954 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03993 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0401 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04024 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04049 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04021 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04007 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03979 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03962 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03974 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04099 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04112 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0413 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04132 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000003 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000003
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xxxv-krt4-tka1 |
|
| 27 |
| url |
VCID-zdzj-q58r-5uby |
| vulnerability_id |
VCID-zdzj-q58r-5uby |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7074 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00167 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00166 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00161 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00162 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00164 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00165 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00168 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0017 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00169 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7074 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7074
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zdzj-q58r-5uby |
|