Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/pdns@4.4.1-1?distro=trixie
Typedeb
Namespacedebian
Namepdns
Version4.4.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.6.1-1
Latest_non_vulnerable_version4.9.14-0+deb13u1
Affected_by_vulnerabilities
0
url VCID-6pjd-r9ca-rbgg
vulnerability_id VCID-6pjd-r9ca-rbgg
summary An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33611
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00208
published_at 2026-04-26T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00272
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33611
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33611
2
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
reference_id powerdns-advisory-powerdns-2026-05.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:24:04Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.14-0%252Bdeb13u1%3Fdistro=trixie
aliases CVE-2026-33611
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pjd-r9ca-rbgg
1
url VCID-6uz8-kz5m-8ya9
vulnerability_id VCID-6uz8-kz5m-8ya9
summary An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33608
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00289
published_at 2026-04-24T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00354
published_at 2026-04-26T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00557
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33608
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33608
2
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
reference_id powerdns-advisory-powerdns-2026-05.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:28:03Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.14-0%252Bdeb13u1%3Fdistro=trixie
aliases CVE-2026-33608
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6uz8-kz5m-8ya9
2
url VCID-7dc3-qdk8-k7b2
vulnerability_id VCID-7dc3-qdk8-k7b2
summary In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27227
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07439
published_at 2026-04-29T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07522
published_at 2026-04-21T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07482
published_at 2026-04-24T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07471
published_at 2026-04-26T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07406
published_at 2026-04-16T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07449
published_at 2026-04-04T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.0743
published_at 2026-04-07T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-08T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.0751
published_at 2026-04-11T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07496
published_at 2026-04-12T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07484
published_at 2026-04-13T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07393
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27227
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27227
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.archlinux.org/AVG-2655
reference_id AVG-2655
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2655
4
reference_url https://security.archlinux.org/AVG-2656
reference_id AVG-2656
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2656
5
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.6.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.6.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
3
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2022-27227
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7dc3-qdk8-k7b2
3
url VCID-chzq-qej6-rkdq
vulnerability_id VCID-chzq-qej6-rkdq
summary An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33257
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01614
published_at 2026-04-29T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00988
published_at 2026-04-24T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00992
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33257
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33257
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html
reference_id powerdns-advisory-2026-05.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:48Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html
4
reference_url https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html
reference_id powerdns-advisory-for-dnsdist-2026-04.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:48Z/
url https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html
5
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
reference_id powerdns-advisory-powerdns-2026-03.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:48Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.14-0%252Bdeb13u1%3Fdistro=trixie
aliases CVE-2026-33257
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chzq-qej6-rkdq
4
url VCID-g4df-vh2e-abch
vulnerability_id VCID-g4df-vh2e-abch
summary Incomplete escaping of LDAP queries when running with 8bit-dns enabled allows users to perform queries of internal domain subtrees.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33609
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00747
published_at 2026-04-24T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00793
published_at 2026-04-26T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00805
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33609
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33609
2
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
reference_id powerdns-advisory-powerdns-2026-05.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:26:43Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.14-0%252Bdeb13u1%3Fdistro=trixie
aliases CVE-2026-33609
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4df-vh2e-abch
5
url VCID-pfhu-1qdf-p7d5
vulnerability_id VCID-pfhu-1qdf-p7d5
summary An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33260
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01614
published_at 2026-04-29T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00988
published_at 2026-04-24T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00992
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33260
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33260
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html
reference_id powerdns-advisory-2026-05.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:50Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html
4
reference_url https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html
reference_id powerdns-advisory-for-dnsdist-2026-04.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:50Z/
url https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html
5
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
reference_id powerdns-advisory-powerdns-2026-03.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T17:54:50Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-powerdns-2026-03.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.14-0%252Bdeb13u1%3Fdistro=trixie
aliases CVE-2026-33260
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pfhu-1qdf-p7d5
6
url VCID-xa6z-cw1x-7qba
vulnerability_id VCID-xa6z-cw1x-7qba
summary A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33610
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03551
published_at 2026-04-24T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04027
published_at 2026-04-26T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05501
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33610
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33610
2
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
reference_id powerdns-advisory-powerdns-2026-05.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:25:29Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
fixed_packages
0
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pdns@4.9.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.14-0%252Bdeb13u1%3Fdistro=trixie
aliases CVE-2026-33610
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xa6z-cw1x-7qba
Fixing_vulnerabilities
0
url VCID-1bej-dqha-zqcm
vulnerability_id VCID-1bej-dqha-zqcm
summary PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack.
references
0
reference_url http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18
reference_id
reference_type
scores
url http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18
1
reference_url http://marc.info/?l=bugtraq&m=112155941310297&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112155941310297&w=2
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2301
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22259
published_at 2026-04-29T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22415
published_at 2026-04-01T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22583
published_at 2026-04-02T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22625
published_at 2026-04-04T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22411
published_at 2026-04-07T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22493
published_at 2026-04-08T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22548
published_at 2026-04-09T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22566
published_at 2026-04-11T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22525
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22471
published_at 2026-04-13T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22486
published_at 2026-04-16T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22483
published_at 2026-04-18T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22432
published_at 2026-04-21T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22279
published_at 2026-04-24T12:55:00Z
14
value 0.00074
scoring_system epss
scoring_elements 0.22265
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2301
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2301
4
reference_url http://securitytracker.com/id?1014504
reference_id
reference_type
scores
url http://securitytracker.com/id?1014504
5
reference_url http://www.novell.com/linux/security/advisories/2005_19_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_19_sr.html
6
reference_url http://www.securityfocus.com/bid/14290
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14290
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318798
reference_id 318798
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318798
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2301
reference_id CVE-2005-2301
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2301
fixed_packages
0
url pkg:deb/debian/pdns@2.9.18-1?distro=trixie
purl pkg:deb/debian/pdns@2.9.18-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@2.9.18-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2005-2301
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1bej-dqha-zqcm
1
url VCID-1jzb-z2bs-vbeb
vulnerability_id VCID-1jzb-z2bs-vbeb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7073
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00443
published_at 2026-04-29T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00447
published_at 2026-04-26T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00433
published_at 2026-04-01T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00435
published_at 2026-04-02T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00434
published_at 2026-04-04T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00426
published_at 2026-04-07T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00423
published_at 2026-04-08T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00424
published_at 2026-04-11T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00419
published_at 2026-04-12T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00418
published_at 2026-04-18T12:55:00Z
10
value 6e-05
scoring_system epss
scoring_elements 0.00414
published_at 2026-04-16T12:55:00Z
11
value 6e-05
scoring_system epss
scoring_elements 0.00445
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7073
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
6
reference_url https://security.archlinux.org/ASA-201701-29
reference_id ASA-201701-29
reference_type
scores
url https://security.archlinux.org/ASA-201701-29
7
reference_url https://security.archlinux.org/ASA-201701-30
reference_id ASA-201701-30
reference_type
scores
url https://security.archlinux.org/ASA-201701-30
8
reference_url https://security.archlinux.org/AVG-147
reference_id AVG-147
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-147
9
reference_url https://security.archlinux.org/AVG-148
reference_id AVG-148
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-148
fixed_packages
0
url pkg:deb/debian/pdns@4.0.2-1?distro=trixie
purl pkg:deb/debian/pdns@4.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2016-7073
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jzb-z2bs-vbeb
2
url VCID-2m6r-ztcg-gbgu
vulnerability_id VCID-2m6r-ztcg-gbgu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7068
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24535
published_at 2026-04-29T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24578
published_at 2026-04-26T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24743
published_at 2026-04-01T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.2482
published_at 2026-04-02T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24858
published_at 2026-04-04T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.2463
published_at 2026-04-07T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24699
published_at 2026-04-08T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24747
published_at 2026-04-09T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.2476
published_at 2026-04-11T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24719
published_at 2026-04-12T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24662
published_at 2026-04-13T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24675
published_at 2026-04-16T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24667
published_at 2026-04-18T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24647
published_at 2026-04-21T12:55:00Z
14
value 0.00085
scoring_system epss
scoring_elements 0.2459
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7068
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
6
reference_url https://security.archlinux.org/ASA-201701-29
reference_id ASA-201701-29
reference_type
scores
url https://security.archlinux.org/ASA-201701-29
7
reference_url https://security.archlinux.org/ASA-201701-30
reference_id ASA-201701-30
reference_type
scores
url https://security.archlinux.org/ASA-201701-30
8
reference_url https://security.archlinux.org/AVG-147
reference_id AVG-147
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-147
9
reference_url https://security.archlinux.org/AVG-148
reference_id AVG-148
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-148
fixed_packages
0
url pkg:deb/debian/pdns@4.0.2-1?distro=trixie
purl pkg:deb/debian/pdns@4.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2016-7068
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2m6r-ztcg-gbgu
3
url VCID-37kj-yg3f-x7g3
vulnerability_id VCID-37kj-yg3f-x7g3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5427
reference_id
reference_type
scores
0
value 0.85547
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-01T12:55:00Z
1
value 0.85547
scoring_system epss
scoring_elements 0.99365
published_at 2026-04-02T12:55:00Z
2
value 0.85547
scoring_system epss
scoring_elements 0.99367
published_at 2026-04-04T12:55:00Z
3
value 0.85547
scoring_system epss
scoring_elements 0.99369
published_at 2026-04-07T12:55:00Z
4
value 0.85547
scoring_system epss
scoring_elements 0.9937
published_at 2026-04-09T12:55:00Z
5
value 0.85547
scoring_system epss
scoring_elements 0.99371
published_at 2026-04-13T12:55:00Z
6
value 0.85547
scoring_system epss
scoring_elements 0.99372
published_at 2026-04-12T12:55:00Z
7
value 0.85547
scoring_system epss
scoring_elements 0.99373
published_at 2026-04-21T12:55:00Z
8
value 0.85547
scoring_system epss
scoring_elements 0.99374
published_at 2026-04-24T12:55:00Z
9
value 0.85547
scoring_system epss
scoring_elements 0.99375
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5427
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
fixed_packages
0
url pkg:deb/debian/pdns@4.0.0~alpha1-1?distro=trixie
purl pkg:deb/debian/pdns@4.0.0~alpha1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.0~alpha1-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2016-5427
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-37kj-yg3f-x7g3
4
url VCID-4c2u-n7p5-nfg4
vulnerability_id VCID-4c2u-n7p5-nfg4
summary PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14626
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12488
published_at 2026-04-29T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12642
published_at 2026-04-24T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12605
published_at 2026-04-26T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12635
published_at 2026-04-01T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12739
published_at 2026-04-02T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12785
published_at 2026-04-04T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12592
published_at 2026-04-07T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12671
published_at 2026-04-08T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12723
published_at 2026-04-09T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12691
published_at 2026-04-11T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.1265
published_at 2026-04-12T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12606
published_at 2026-04-13T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.1251
published_at 2026-04-16T12:55:00Z
13
value 0.00042
scoring_system epss
scoring_elements 0.12518
published_at 2026-04-18T12:55:00Z
14
value 0.00042
scoring_system epss
scoring_elements 0.12632
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14626
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14626
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162
reference_id 913162
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163
reference_id 913163
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163
5
reference_url https://security.archlinux.org/ASA-201811-12
reference_id ASA-201811-12
reference_type
scores
url https://security.archlinux.org/ASA-201811-12
6
reference_url https://security.archlinux.org/ASA-201811-13
reference_id ASA-201811-13
reference_type
scores
url https://security.archlinux.org/ASA-201811-13
7
reference_url https://security.archlinux.org/AVG-804
reference_id AVG-804
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-804
8
reference_url https://security.archlinux.org/AVG-805
reference_id AVG-805
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-805
9
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.1.5-1?distro=trixie
purl pkg:deb/debian/pdns@4.1.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.5-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2018-14626
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4c2u-n7p5-nfg4
5
url VCID-5efj-fcg6-cuc5
vulnerability_id VCID-5efj-fcg6-cuc5
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10162
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.0067
published_at 2026-04-29T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.0064
published_at 2026-04-01T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00644
published_at 2026-04-02T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00637
published_at 2026-04-04T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00639
published_at 2026-04-07T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00638
published_at 2026-04-08T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00632
published_at 2026-04-09T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00631
published_at 2026-04-11T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00626
published_at 2026-04-18T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.00628
published_at 2026-04-13T12:55:00Z
10
value 7e-05
scoring_system epss
scoring_elements 0.0062
published_at 2026-04-16T12:55:00Z
11
value 7e-05
scoring_system epss
scoring_elements 0.00667
published_at 2026-04-21T12:55:00Z
12
value 7e-05
scoring_system epss
scoring_elements 0.00666
published_at 2026-04-24T12:55:00Z
13
value 7e-05
scoring_system epss
scoring_elements 0.00669
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10162
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/pdns@4.1.6-3?distro=trixie
purl pkg:deb/debian/pdns@4.1.6-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2019-10162
risk_score 0.9
exploitability 0.5
weighted_severity 1.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5efj-fcg6-cuc5
6
url VCID-6nht-qd1p-qbbz
vulnerability_id VCID-6nht-qd1p-qbbz
summary
Two vulnerabilities have been discovered in PowerDNS, possibly leading to a
    Denial of Service and easing cache poisoning attacks.
references
0
reference_url http://doc.powerdns.com/changelog.html
reference_id
reference_type
scores
url http://doc.powerdns.com/changelog.html
1
reference_url http://doc.powerdns.com/powerdns-advisory-2008-02.html
reference_id
reference_type
scores
url http://doc.powerdns.com/powerdns-advisory-2008-02.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
3
reference_url http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html
reference_id
reference_type
scores
url http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3337.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3337.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3337
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05665
published_at 2026-04-29T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05374
published_at 2026-04-01T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05411
published_at 2026-04-02T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05445
published_at 2026-04-04T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.0545
published_at 2026-04-07T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05486
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05507
published_at 2026-04-09T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05481
published_at 2026-04-11T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05467
published_at 2026-04-12T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.0546
published_at 2026-04-13T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05412
published_at 2026-04-16T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.0542
published_at 2026-04-18T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05591
published_at 2026-04-21T12:55:00Z
13
value 0.0002
scoring_system epss
scoring_elements 0.05623
published_at 2026-04-24T12:55:00Z
14
value 0.0002
scoring_system epss
scoring_elements 0.0566
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3337
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337
7
reference_url http://secunia.com/advisories/31401
reference_id
reference_type
scores
url http://secunia.com/advisories/31401
8
reference_url http://secunia.com/advisories/31407
reference_id
reference_type
scores
url http://secunia.com/advisories/31407
9
reference_url http://secunia.com/advisories/31448
reference_id
reference_type
scores
url http://secunia.com/advisories/31448
10
reference_url http://secunia.com/advisories/31687
reference_id
reference_type
scores
url http://secunia.com/advisories/31687
11
reference_url http://secunia.com/advisories/33264
reference_id
reference_type
scores
url http://secunia.com/advisories/33264
12
reference_url http://security.gentoo.org/glsa/glsa-200812-19.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-19.xml
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44253
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44253
14
reference_url https://www.debian.org/security/2008/dsa-1628
reference_id
reference_type
scores
url https://www.debian.org/security/2008/dsa-1628
15
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html
16
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html
17
reference_url http://www.securityfocus.com/bid/30587
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30587
18
reference_url http://www.vupen.com/english/advisories/2008/2320
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2320
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=458122
reference_id 458122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=458122
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3337
reference_id CVE-2008-3337
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3337
23
reference_url https://security.gentoo.org/glsa/200812-19
reference_id GLSA-200812-19
reference_type
scores
url https://security.gentoo.org/glsa/200812-19
fixed_packages
0
url pkg:deb/debian/pdns@2.9.21.1-1?distro=trixie
purl pkg:deb/debian/pdns@2.9.21.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@2.9.21.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2008-3337
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6nht-qd1p-qbbz
7
url VCID-8fks-8s21-b7b4
vulnerability_id VCID-8fks-8s21-b7b4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10163
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00736
published_at 2026-04-29T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00706
published_at 2026-04-04T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00709
published_at 2026-04-08T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.0071
published_at 2026-04-07T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.007
published_at 2026-04-11T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00694
published_at 2026-04-12T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00693
published_at 2026-04-18T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00687
published_at 2026-04-16T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00735
published_at 2026-04-21T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00737
published_at 2026-04-24T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.00738
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10163
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/pdns@4.1.6-3?distro=trixie
purl pkg:deb/debian/pdns@4.1.6-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-3%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2019-10163
risk_score 0.9
exploitability 0.5
weighted_severity 1.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fks-8s21-b7b4
8
url VCID-bb3a-3ehq-8bhd
vulnerability_id VCID-bb3a-3ehq-8bhd
summary PowerDNS (aka pdns) Authoritative Server 3.4.4 before 3.4.7 allows remote attackers to cause a denial of service (assertion failure and server crash) via crafted query packets.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171865.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171865.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171976.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172193.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172193.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5311
reference_id
reference_type
scores
0
value 0.00478
scoring_system epss
scoring_elements 0.65053
published_at 2026-04-29T12:55:00Z
1
value 0.00478
scoring_system epss
scoring_elements 0.6491
published_at 2026-04-01T12:55:00Z
2
value 0.00478
scoring_system epss
scoring_elements 0.6496
published_at 2026-04-02T12:55:00Z
3
value 0.00478
scoring_system epss
scoring_elements 0.64987
published_at 2026-04-04T12:55:00Z
4
value 0.00478
scoring_system epss
scoring_elements 0.6495
published_at 2026-04-07T12:55:00Z
5
value 0.00478
scoring_system epss
scoring_elements 0.64999
published_at 2026-04-08T12:55:00Z
6
value 0.00478
scoring_system epss
scoring_elements 0.65013
published_at 2026-04-09T12:55:00Z
7
value 0.00478
scoring_system epss
scoring_elements 0.65031
published_at 2026-04-11T12:55:00Z
8
value 0.00478
scoring_system epss
scoring_elements 0.65021
published_at 2026-04-12T12:55:00Z
9
value 0.00478
scoring_system epss
scoring_elements 0.64993
published_at 2026-04-13T12:55:00Z
10
value 0.00478
scoring_system epss
scoring_elements 0.6503
published_at 2026-04-16T12:55:00Z
11
value 0.00478
scoring_system epss
scoring_elements 0.6504
published_at 2026-04-18T12:55:00Z
12
value 0.00478
scoring_system epss
scoring_elements 0.65024
published_at 2026-04-21T12:55:00Z
13
value 0.00478
scoring_system epss
scoring_elements 0.65043
published_at 2026-04-24T12:55:00Z
14
value 0.00478
scoring_system epss
scoring_elements 0.65056
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5311
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5311
5
reference_url https://doc.powerdns.com/md/security/powerdns-advisory-2015-03/
reference_id
reference_type
scores
url https://doc.powerdns.com/md/security/powerdns-advisory-2015-03/
6
reference_url http://www.openwall.com/lists/oss-security/2015/11/09/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/09/3
7
reference_url http://www.securitytracker.com/id/1034098
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034098
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.5:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.6:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5311
reference_id CVE-2015-5311
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-5311
fixed_packages
0
url pkg:deb/debian/pdns@3.4.7-1?distro=trixie
purl pkg:deb/debian/pdns@3.4.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.7-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2015-5311
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bb3a-3ehq-8bhd
9
url VCID-ch2d-p2ru-23ex
vulnerability_id VCID-ch2d-p2ru-23ex
summary PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10851
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.2874
published_at 2026-04-29T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.28924
published_at 2026-04-24T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.28811
published_at 2026-04-26T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29135
published_at 2026-04-01T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.2921
published_at 2026-04-02T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29262
published_at 2026-04-04T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29075
published_at 2026-04-07T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29138
published_at 2026-04-08T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.2918
published_at 2026-04-09T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29186
published_at 2026-04-11T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.2914
published_at 2026-04-12T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29088
published_at 2026-04-13T12:55:00Z
12
value 0.00108
scoring_system epss
scoring_elements 0.29114
published_at 2026-04-16T12:55:00Z
13
value 0.00108
scoring_system epss
scoring_elements 0.29091
published_at 2026-04-18T12:55:00Z
14
value 0.00108
scoring_system epss
scoring_elements 0.29044
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10851
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10851
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162
reference_id 913162
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163
reference_id 913163
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913163
5
reference_url https://security.archlinux.org/ASA-201811-12
reference_id ASA-201811-12
reference_type
scores
url https://security.archlinux.org/ASA-201811-12
6
reference_url https://security.archlinux.org/ASA-201811-13
reference_id ASA-201811-13
reference_type
scores
url https://security.archlinux.org/ASA-201811-13
7
reference_url https://security.archlinux.org/AVG-804
reference_id AVG-804
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-804
8
reference_url https://security.archlinux.org/AVG-805
reference_id AVG-805
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-805
9
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.1.5-1?distro=trixie
purl pkg:deb/debian/pdns@4.1.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.5-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2018-10851
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ch2d-p2ru-23ex
10
url VCID-d13q-prqh-buge
vulnerability_id VCID-d13q-prqh-buge
summary The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1868
reference_id
reference_type
scores
0
value 0.00506
scoring_system epss
scoring_elements 0.66161
published_at 2026-04-01T12:55:00Z
1
value 0.00506
scoring_system epss
scoring_elements 0.66202
published_at 2026-04-02T12:55:00Z
2
value 0.00506
scoring_system epss
scoring_elements 0.66229
published_at 2026-04-04T12:55:00Z
3
value 0.00506
scoring_system epss
scoring_elements 0.66198
published_at 2026-04-07T12:55:00Z
4
value 0.00506
scoring_system epss
scoring_elements 0.66246
published_at 2026-04-08T12:55:00Z
5
value 0.00506
scoring_system epss
scoring_elements 0.66259
published_at 2026-04-09T12:55:00Z
6
value 0.00506
scoring_system epss
scoring_elements 0.66279
published_at 2026-04-11T12:55:00Z
7
value 0.00506
scoring_system epss
scoring_elements 0.66266
published_at 2026-04-12T12:55:00Z
8
value 0.00506
scoring_system epss
scoring_elements 0.66235
published_at 2026-04-13T12:55:00Z
9
value 0.00506
scoring_system epss
scoring_elements 0.6627
published_at 2026-04-21T12:55:00Z
10
value 0.00506
scoring_system epss
scoring_elements 0.66285
published_at 2026-04-18T12:55:00Z
11
value 0.00506
scoring_system epss
scoring_elements 0.66293
published_at 2026-04-24T12:55:00Z
12
value 0.00506
scoring_system epss
scoring_elements 0.66307
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1868
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1868
fixed_packages
0
url pkg:deb/debian/pdns@3.4.4-1?distro=trixie
purl pkg:deb/debian/pdns@3.4.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.4-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2015-1868
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d13q-prqh-buge
11
url VCID-ez68-8ben-nuef
vulnerability_id VCID-ez68-8ben-nuef
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24696
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22579
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22751
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22795
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22586
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22662
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22713
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22732
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22693
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22636
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22652
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22649
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.226
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22446
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22436
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22434
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24696
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24696
fixed_packages
0
url pkg:deb/debian/pdns@4.4.0-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2020-24696
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ez68-8ben-nuef
12
url VCID-gj88-me79-1qb3
vulnerability_id VCID-gj88-me79-1qb3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5426
reference_id
reference_type
scores
0
value 0.33823
scoring_system epss
scoring_elements 0.96923
published_at 2026-04-01T12:55:00Z
1
value 0.33823
scoring_system epss
scoring_elements 0.96931
published_at 2026-04-02T12:55:00Z
2
value 0.33823
scoring_system epss
scoring_elements 0.96936
published_at 2026-04-04T12:55:00Z
3
value 0.33823
scoring_system epss
scoring_elements 0.96939
published_at 2026-04-07T12:55:00Z
4
value 0.33823
scoring_system epss
scoring_elements 0.96947
published_at 2026-04-08T12:55:00Z
5
value 0.3697
scoring_system epss
scoring_elements 0.9715
published_at 2026-04-09T12:55:00Z
6
value 0.3697
scoring_system epss
scoring_elements 0.97154
published_at 2026-04-11T12:55:00Z
7
value 0.3697
scoring_system epss
scoring_elements 0.97155
published_at 2026-04-12T12:55:00Z
8
value 0.3697
scoring_system epss
scoring_elements 0.97156
published_at 2026-04-13T12:55:00Z
9
value 0.3697
scoring_system epss
scoring_elements 0.97163
published_at 2026-04-16T12:55:00Z
10
value 0.3697
scoring_system epss
scoring_elements 0.97165
published_at 2026-04-18T12:55:00Z
11
value 0.3697
scoring_system epss
scoring_elements 0.97169
published_at 2026-04-21T12:55:00Z
12
value 0.3697
scoring_system epss
scoring_elements 0.9717
published_at 2026-04-24T12:55:00Z
13
value 0.3697
scoring_system epss
scoring_elements 0.97171
published_at 2026-04-26T12:55:00Z
14
value 0.3697
scoring_system epss
scoring_elements 0.97173
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5426
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
fixed_packages
0
url pkg:deb/debian/pdns@4.0.0~alpha1-1?distro=trixie
purl pkg:deb/debian/pdns@4.0.0~alpha1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.0~alpha1-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2016-5426
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gj88-me79-1qb3
13
url VCID-gvr7-64sm-1kdv
vulnerability_id VCID-gvr7-64sm-1kdv
summary PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36754
reference_id
reference_type
scores
0
value 0.8134
scoring_system epss
scoring_elements 0.99175
published_at 2026-04-29T12:55:00Z
1
value 0.8134
scoring_system epss
scoring_elements 0.99174
published_at 2026-04-26T12:55:00Z
2
value 0.8134
scoring_system epss
scoring_elements 0.99161
published_at 2026-04-01T12:55:00Z
3
value 0.8134
scoring_system epss
scoring_elements 0.99162
published_at 2026-04-02T12:55:00Z
4
value 0.8134
scoring_system epss
scoring_elements 0.99164
published_at 2026-04-04T12:55:00Z
5
value 0.8134
scoring_system epss
scoring_elements 0.99167
published_at 2026-04-07T12:55:00Z
6
value 0.8134
scoring_system epss
scoring_elements 0.99169
published_at 2026-04-12T12:55:00Z
7
value 0.8134
scoring_system epss
scoring_elements 0.99168
published_at 2026-04-13T12:55:00Z
8
value 0.8134
scoring_system epss
scoring_elements 0.9917
published_at 2026-04-16T12:55:00Z
9
value 0.8134
scoring_system epss
scoring_elements 0.99171
published_at 2026-04-18T12:55:00Z
10
value 0.8134
scoring_system epss
scoring_elements 0.99173
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36754
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.archlinux.org/ASA-202107-73
reference_id ASA-202107-73
reference_type
scores
url https://security.archlinux.org/ASA-202107-73
3
reference_url https://security.archlinux.org/AVG-2222
reference_id AVG-2222
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2222
fixed_packages
0
url pkg:deb/debian/pdns@0?distro=trixie
purl pkg:deb/debian/pdns@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@0%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2021-36754
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gvr7-64sm-1kdv
14
url VCID-j5zf-9dpp-qkh6
vulnerability_id VCID-j5zf-9dpp-qkh6
summary
Two vulnerabilities have been discovered in PowerDNS, possibly leading to a
    Denial of Service and easing cache poisoning attacks.
references
0
reference_url http://doc.powerdns.com/powerdns-advisory-2008-03.html
reference_id
reference_type
scores
url http://doc.powerdns.com/powerdns-advisory-2008-03.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5277.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5277.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5277
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08547
published_at 2026-04-29T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08495
published_at 2026-04-01T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08524
published_at 2026-04-02T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08579
published_at 2026-04-04T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08497
published_at 2026-04-07T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08571
published_at 2026-04-08T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08592
published_at 2026-04-09T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08587
published_at 2026-04-11T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08566
published_at 2026-04-12T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08548
published_at 2026-04-13T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08441
published_at 2026-04-16T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08426
published_at 2026-04-18T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08585
published_at 2026-04-21T12:55:00Z
13
value 0.0003
scoring_system epss
scoring_elements 0.08598
published_at 2026-04-24T12:55:00Z
14
value 0.0003
scoring_system epss
scoring_elements 0.08551
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5277
5
reference_url http://secunia.com/advisories/32979
reference_id
reference_type
scores
url http://secunia.com/advisories/32979
6
reference_url http://secunia.com/advisories/33264
reference_id
reference_type
scores
url http://secunia.com/advisories/33264
7
reference_url http://security.gentoo.org/glsa/glsa-200812-19.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-19.xml
8
reference_url http://securitytracker.com/id?1021304
reference_id
reference_type
scores
url http://securitytracker.com/id?1021304
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47076
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47076
10
reference_url http://www.securityfocus.com/bid/32627
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32627
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=475440
reference_id 475440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=475440
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.11:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.12:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.8:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:1.99.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:1.99.9:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:rc1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0:rc2:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.5.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5277
reference_id CVE-2008-5277
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5277
55
reference_url https://security.gentoo.org/glsa/200812-19
reference_id GLSA-200812-19
reference_type
scores
url https://security.gentoo.org/glsa/200812-19
fixed_packages
0
url pkg:deb/debian/pdns@2.9.21.2-1?distro=trixie
purl pkg:deb/debian/pdns@2.9.21.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@2.9.21.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2008-5277
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j5zf-9dpp-qkh6
15
url VCID-jrb1-cuhc-nqa1
vulnerability_id VCID-jrb1-cuhc-nqa1
summary pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1046
reference_id
reference_type
scores
0
value 2e-05
scoring_system epss
scoring_elements 0.00056
published_at 2026-04-29T12:55:00Z
1
value 2e-05
scoring_system epss
scoring_elements 0.00052
published_at 2026-04-09T12:55:00Z
2
value 2e-05
scoring_system epss
scoring_elements 0.00057
published_at 2026-04-21T12:55:00Z
3
value 2e-05
scoring_system epss
scoring_elements 0.00058
published_at 2026-04-26T12:55:00Z
4
value 2e-05
scoring_system epss
scoring_elements 0.00054
published_at 2026-04-18T12:55:00Z
5
value 2e-05
scoring_system epss
scoring_elements 0.00053
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1046
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1046
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1046
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1046
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898255
reference_id 898255
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898255
4
reference_url https://security.archlinux.org/ASA-201805-1
reference_id ASA-201805-1
reference_type
scores
url https://security.archlinux.org/ASA-201805-1
5
reference_url https://security.archlinux.org/AVG-686
reference_id AVG-686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-686
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:pdns:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:pdns:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:pdns:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1046
reference_id CVE-2018-1046
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1046
8
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.1.2-1?distro=trixie
purl pkg:deb/debian/pdns@4.1.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2018-1046
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrb1-cuhc-nqa1
16
url VCID-keaf-6ca3-vkbc
vulnerability_id VCID-keaf-6ca3-vkbc
summary An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15091
reference_id
reference_type
scores
0
value 3e-05
scoring_system epss
scoring_elements 0.00069
published_at 2026-04-18T12:55:00Z
1
value 3e-05
scoring_system epss
scoring_elements 0.00071
published_at 2026-04-29T12:55:00Z
2
value 3e-05
scoring_system epss
scoring_elements 0.00072
published_at 2026-04-21T12:55:00Z
3
value 3e-05
scoring_system epss
scoring_elements 0.0007
published_at 2026-04-04T12:55:00Z
4
value 3e-05
scoring_system epss
scoring_elements 0.00068
published_at 2026-04-16T12:55:00Z
5
value 3e-05
scoring_system epss
scoring_elements 0.00073
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15091
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15091
2
reference_url https://security.archlinux.org/ASA-201711-30
reference_id ASA-201711-30
reference_type
scores
url https://security.archlinux.org/ASA-201711-30
3
reference_url https://security.archlinux.org/AVG-519
reference_id AVG-519
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-519
fixed_packages
0
url pkg:deb/debian/pdns@4.0.5-1?distro=trixie
purl pkg:deb/debian/pdns@4.0.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.5-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2017-15091
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-keaf-6ca3-vkbc
17
url VCID-kray-53q1-6qb4
vulnerability_id VCID-kray-53q1-6qb4
summary PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a "blank out" of answers to those clients that are allowed to use recursion.
references
0
reference_url http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18
reference_id
reference_type
scores
url http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18
1
reference_url http://marc.info/?l=bugtraq&m=112155941310297&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112155941310297&w=2
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2302
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00556
published_at 2026-04-29T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00529
published_at 2026-04-01T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00534
published_at 2026-04-02T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00526
published_at 2026-04-04T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00525
published_at 2026-04-07T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00522
published_at 2026-04-13T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.0052
published_at 2026-04-12T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00518
published_at 2026-04-16T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00523
published_at 2026-04-18T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.00557
published_at 2026-04-21T12:55:00Z
10
value 7e-05
scoring_system epss
scoring_elements 0.00552
published_at 2026-04-24T12:55:00Z
11
value 7e-05
scoring_system epss
scoring_elements 0.00555
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2302
4
reference_url http://securitytracker.com/id?1014504
reference_id
reference_type
scores
url http://securitytracker.com/id?1014504
5
reference_url http://www.novell.com/linux/security/advisories/2005_19_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_19_sr.html
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318798
reference_id 318798
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318798
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2302
reference_id CVE-2005-2302
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2302
fixed_packages
0
url pkg:deb/debian/pdns@2.9.18-1?distro=trixie
purl pkg:deb/debian/pdns@2.9.18-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@2.9.18-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2005-2302
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kray-53q1-6qb4
18
url VCID-kzps-gj5k-8yh3
vulnerability_id VCID-kzps-gj5k-8yh3
summary PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop.
references
0
reference_url http://doc.powerdns.com/powerdns-advisory-2006-02.html
reference_id
reference_type
scores
url http://doc.powerdns.com/powerdns-advisory-2006-02.html
1
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4252
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.0186
published_at 2026-04-29T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01702
published_at 2026-04-01T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01745
published_at 2026-04-18T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01759
published_at 2026-04-07T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01762
published_at 2026-04-08T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01771
published_at 2026-04-09T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01766
published_at 2026-04-11T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01756
published_at 2026-04-12T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01754
published_at 2026-04-13T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01829
published_at 2026-04-21T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.0182
published_at 2026-04-24T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01814
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4252
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4252
4
reference_url http://secunia.com/advisories/22824
reference_id
reference_type
scores
url http://secunia.com/advisories/22824
5
reference_url http://secunia.com/advisories/22976
reference_id
reference_type
scores
url http://secunia.com/advisories/22976
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/30257
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/30257
7
reference_url http://www.securityfocus.com/bid/21037
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21037
8
reference_url http://www.vupen.com/english/advisories/2006/4484
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4484
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398559
reference_id 398559
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398559
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-4252
reference_id CVE-2006-4252
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-4252
fixed_packages
0
url pkg:deb/debian/pdns@0?distro=trixie
purl pkg:deb/debian/pdns@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@0%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2006-4252
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kzps-gj5k-8yh3
19
url VCID-m7h2-vam9-1yhn
vulnerability_id VCID-m7h2-vam9-1yhn
summary
An information disclosure vulnerability in PowerDNS allow remote
    attackers to obtain sensitive information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17482
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15547
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1559
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15657
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15457
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15544
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15599
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15563
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15525
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15387
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15392
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15444
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15484
published_at 2026-04-24T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.15483
published_at 2026-04-26T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15426
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17482
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17482
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970737
reference_id 970737
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970737
3
reference_url https://security.gentoo.org/glsa/202012-18
reference_id GLSA-202012-18
reference_type
scores
url https://security.gentoo.org/glsa/202012-18
4
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:deb/debian/pdns@4.3.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.3.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.3.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2020-17482
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m7h2-vam9-1yhn
20
url VCID-mnn7-6732-ykdm
vulnerability_id VCID-mnn7-6732-ykdm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7072
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08299
published_at 2026-04-29T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08294
published_at 2026-04-01T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08348
published_at 2026-04-02T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08401
published_at 2026-04-04T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08322
published_at 2026-04-07T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08386
published_at 2026-04-08T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08402
published_at 2026-04-09T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08394
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08375
published_at 2026-04-12T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08359
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08252
published_at 2026-04-16T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08235
published_at 2026-04-18T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08398
published_at 2026-04-21T12:55:00Z
13
value 0.00029
scoring_system epss
scoring_elements 0.08368
published_at 2026-04-24T12:55:00Z
14
value 0.00029
scoring_system epss
scoring_elements 0.08334
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7072
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
6
reference_url https://security.archlinux.org/ASA-201701-29
reference_id ASA-201701-29
reference_type
scores
url https://security.archlinux.org/ASA-201701-29
7
reference_url https://security.archlinux.org/AVG-147
reference_id AVG-147
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-147
fixed_packages
0
url pkg:deb/debian/pdns@4.0.2-1?distro=trixie
purl pkg:deb/debian/pdns@4.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2016-7072
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mnn7-6732-ykdm
21
url VCID-ncn3-gw35-tqd2
vulnerability_id VCID-ncn3-gw35-tqd2
summary A vulnerability in PowerDNS could lead to a temporary Denial of Service.
references
0
reference_url http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17
reference_id
reference_type
scores
url http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17
1
reference_url http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21
reference_id
reference_type
scores
url http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0428
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00905
published_at 2026-04-26T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.0085
published_at 2026-04-18T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00856
published_at 2026-04-02T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00857
published_at 2026-04-04T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00859
published_at 2026-04-07T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-08T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.0086
published_at 2026-04-09T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00844
published_at 2026-04-16T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00845
published_at 2026-04-13T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00898
published_at 2026-04-21T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00901
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0428
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0428
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19221
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19221
5
reference_url http://www.gentoo.org/security/en/glsa/glsa-200502-15.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200502-15.xml
6
reference_url http://www.securityfocus.com/bid/12446
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12446
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.0_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0_rc1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0428
reference_id CVE-2005-0428
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0428
11
reference_url https://security.gentoo.org/glsa/200502-15
reference_id GLSA-200502-15
reference_type
scores
url https://security.gentoo.org/glsa/200502-15
fixed_packages
0
url pkg:deb/debian/pdns@2.9.16-6?distro=trixie
purl pkg:deb/debian/pdns@2.9.16-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@2.9.16-6%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2005-0428
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ncn3-gw35-tqd2
22
url VCID-nwfa-n5f2-abe7
vulnerability_id VCID-nwfa-n5f2-abe7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5470
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.0045
published_at 2026-04-29T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00435
published_at 2026-04-01T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00439
published_at 2026-04-04T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00431
published_at 2026-04-07T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00428
published_at 2026-04-08T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.0043
published_at 2026-04-11T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00425
published_at 2026-04-18T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00424
published_at 2026-04-13T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00421
published_at 2026-04-16T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00455
published_at 2026-04-26T12:55:00Z
10
value 6e-05
scoring_system epss
scoring_elements 0.00453
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5470
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5470
2
reference_url https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
reference_id
reference_type
scores
url https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
3
reference_url http://www.openwall.com/lists/oss-security/2015/07/07/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/07/07/6
4
reference_url http://www.openwall.com/lists/oss-security/2015/07/10/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/07/10/8
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5470
reference_id CVE-2015-5470
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-5470
fixed_packages
0
url pkg:deb/debian/pdns@3.4.5-1?distro=trixie
purl pkg:deb/debian/pdns@3.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2015-5470
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfa-n5f2-abe7
23
url VCID-q6d4-mv53-syhu
vulnerability_id VCID-q6d4-mv53-syhu
summary pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissions for the pdns user. Other backends are not affected.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-7210
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29111
published_at 2026-04-01T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29186
published_at 2026-04-02T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29238
published_at 2026-04-04T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29049
published_at 2026-04-07T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29112
published_at 2026-04-08T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29154
published_at 2026-04-09T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.2916
published_at 2026-04-11T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31154
published_at 2026-04-18T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31184
published_at 2026-04-12T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.3114
published_at 2026-04-13T12:55:00Z
10
value 0.00121
scoring_system epss
scoring_elements 0.31173
published_at 2026-04-16T12:55:00Z
11
value 0.00121
scoring_system epss
scoring_elements 0.31123
published_at 2026-04-21T12:55:00Z
12
value 0.0035
scoring_system epss
scoring_elements 0.57479
published_at 2026-04-24T12:55:00Z
13
value 0.0035
scoring_system epss
scoring_elements 0.57498
published_at 2026-04-26T12:55:00Z
14
value 0.0035
scoring_system epss
scoring_elements 0.57477
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-7210
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7210
2
reference_url https://salsa.debian.org/debian/pdns/-/commit/f0de6b3583039bb63344fbd5eb246939264d7b05
reference_id f0de6b3583039bb63344fbd5eb246939264d7b05
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-27T18:43:03Z/
url https://salsa.debian.org/debian/pdns/-/commit/f0de6b3583039bb63344fbd5eb246939264d7b05
3
reference_url https://lists.debian.org/debian-lts-announce/2016/05/msg00046.html
reference_id msg00046.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-27T18:43:03Z/
url https://lists.debian.org/debian-lts-announce/2016/05/msg00046.html
fixed_packages
0
url pkg:deb/debian/pdns@3.3.1-1?distro=trixie
purl pkg:deb/debian/pdns@3.3.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.3.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2014-7210
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q6d4-mv53-syhu
24
url VCID-qbnt-a5xe-2bg6
vulnerability_id VCID-qbnt-a5xe-2bg6
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24697
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.31989
published_at 2026-04-29T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32361
published_at 2026-04-01T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.3251
published_at 2026-04-02T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32545
published_at 2026-04-04T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32368
published_at 2026-04-07T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32417
published_at 2026-04-08T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32444
published_at 2026-04-09T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32448
published_at 2026-04-11T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.3241
published_at 2026-04-12T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32382
published_at 2026-04-13T12:55:00Z
10
value 0.00129
scoring_system epss
scoring_elements 0.32418
published_at 2026-04-16T12:55:00Z
11
value 0.00129
scoring_system epss
scoring_elements 0.32396
published_at 2026-04-18T12:55:00Z
12
value 0.00129
scoring_system epss
scoring_elements 0.32367
published_at 2026-04-21T12:55:00Z
13
value 0.00129
scoring_system epss
scoring_elements 0.32194
published_at 2026-04-24T12:55:00Z
14
value 0.00129
scoring_system epss
scoring_elements 0.32072
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24697
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24697
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/pdns@4.4.0-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2020-24697
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbnt-a5xe-2bg6
25
url VCID-sa8k-ybav-c3ax
vulnerability_id VCID-sa8k-ybav-c3ax
summary The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0038
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22526
published_at 2026-04-29T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22663
published_at 2026-04-01T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22838
published_at 2026-04-02T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22882
published_at 2026-04-04T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22674
published_at 2026-04-07T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22749
published_at 2026-04-08T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22801
published_at 2026-04-09T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22823
published_at 2026-04-11T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22785
published_at 2026-04-12T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22728
published_at 2026-04-13T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22744
published_at 2026-04-16T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22739
published_at 2026-04-18T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22699
published_at 2026-04-21T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22537
published_at 2026-04-24T12:55:00Z
14
value 0.00076
scoring_system epss
scoring_elements 0.22528
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0038
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0038
2
reference_url http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html
reference_id
reference_type
scores
url http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html
3
reference_url http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en
reference_id
reference_type
scores
url http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en
4
reference_url http://www.osvdb.org/25291
reference_id
reference_type
scores
url http://www.osvdb.org/25291
5
reference_url http://www.securityfocus.com/bid/13729
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13729
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.0_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.0_rc1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0038
reference_id CVE-2005-0038
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0038
fixed_packages
0
url pkg:deb/debian/pdns@2.9.17-1?distro=trixie
purl pkg:deb/debian/pdns@2.9.17-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@2.9.17-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2005-0038
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sa8k-ybav-c3ax
26
url VCID-srnu-wj3x-2qd1
vulnerability_id VCID-srnu-wj3x-2qd1
summary
A vulnerability in PowerDNS could allow a remote attacker to create
    a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0206
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00212
published_at 2026-04-13T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00213
published_at 2026-04-02T12:55:00Z
2
value 5e-05
scoring_system epss
scoring_elements 0.00214
published_at 2026-04-16T12:55:00Z
3
value 5e-05
scoring_system epss
scoring_elements 0.00211
published_at 2026-04-07T12:55:00Z
4
value 5e-05
scoring_system epss
scoring_elements 0.0021
published_at 2026-04-09T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.00215
published_at 2026-04-18T12:55:00Z
6
value 5e-05
scoring_system epss
scoring_elements 0.00222
published_at 2026-04-24T12:55:00Z
7
value 5e-05
scoring_system epss
scoring_elements 0.00221
published_at 2026-04-26T12:55:00Z
8
value 5e-05
scoring_system epss
scoring_elements 0.00219
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0206
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0206
2
reference_url https://security.gentoo.org/glsa/201202-04
reference_id GLSA-201202-04
reference_type
scores
url https://security.gentoo.org/glsa/201202-04
fixed_packages
0
url pkg:deb/debian/pdns@3.0-1.1?distro=trixie
purl pkg:deb/debian/pdns@3.0-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.0-1.1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2012-0206
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srnu-wj3x-2qd1
27
url VCID-tqpr-vezf-4ye4
vulnerability_id VCID-tqpr-vezf-4ye4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5230
reference_id
reference_type
scores
0
value 0.00177
scoring_system epss
scoring_elements 0.39134
published_at 2026-04-01T12:55:00Z
1
value 0.00177
scoring_system epss
scoring_elements 0.3932
published_at 2026-04-02T12:55:00Z
2
value 0.00177
scoring_system epss
scoring_elements 0.39343
published_at 2026-04-04T12:55:00Z
3
value 0.00177
scoring_system epss
scoring_elements 0.39257
published_at 2026-04-07T12:55:00Z
4
value 0.00177
scoring_system epss
scoring_elements 0.39312
published_at 2026-04-08T12:55:00Z
5
value 0.00177
scoring_system epss
scoring_elements 0.39329
published_at 2026-04-09T12:55:00Z
6
value 0.00177
scoring_system epss
scoring_elements 0.3934
published_at 2026-04-11T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.39302
published_at 2026-04-12T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39284
published_at 2026-04-13T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.39336
published_at 2026-04-16T12:55:00Z
10
value 0.00177
scoring_system epss
scoring_elements 0.39308
published_at 2026-04-18T12:55:00Z
11
value 0.00177
scoring_system epss
scoring_elements 0.39221
published_at 2026-04-21T12:55:00Z
12
value 0.00292
scoring_system epss
scoring_elements 0.52587
published_at 2026-04-24T12:55:00Z
13
value 0.00292
scoring_system epss
scoring_elements 0.52597
published_at 2026-04-26T12:55:00Z
14
value 0.00292
scoring_system epss
scoring_elements 0.5256
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5230
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5230
fixed_packages
0
url pkg:deb/debian/pdns@3.4.6-1?distro=trixie
purl pkg:deb/debian/pdns@3.4.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@3.4.6-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2015-5230
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqpr-vezf-4ye4
28
url VCID-w3fn-hwyn-6ba7
vulnerability_id VCID-w3fn-hwyn-6ba7
summary PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10203
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05795
published_at 2026-04-29T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05717
published_at 2026-04-21T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0575
published_at 2026-04-24T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05787
published_at 2026-04-26T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05506
published_at 2026-04-01T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05541
published_at 2026-04-02T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05578
published_at 2026-04-04T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05575
published_at 2026-04-07T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05613
published_at 2026-04-08T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05638
published_at 2026-04-09T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05611
published_at 2026-04-11T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05602
published_at 2026-04-12T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05595
published_at 2026-04-13T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05545
published_at 2026-04-16T12:55:00Z
14
value 0.00021
scoring_system epss
scoring_elements 0.05559
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10203
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10203
3
reference_url https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-06.html
reference_id
reference_type
scores
url https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-06.html
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970729
reference_id 970729
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970729
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10203
reference_id CVE-2019-10203
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-10203
fixed_packages
0
url pkg:deb/debian/pdns@4.2.0-1?distro=trixie
purl pkg:deb/debian/pdns@4.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.2.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2019-10203
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w3fn-hwyn-6ba7
29
url VCID-w9w8-k8h2-b7fc
vulnerability_id VCID-w9w8-k8h2-b7fc
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00022.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3871
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09193
published_at 2026-04-29T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09071
published_at 2026-04-18T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09226
published_at 2026-04-21T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09272
published_at 2026-04-24T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09218
published_at 2026-04-26T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09152
published_at 2026-04-01T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09156
published_at 2026-04-02T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09207
published_at 2026-04-04T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.0913
published_at 2026-04-07T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09211
published_at 2026-04-08T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09239
published_at 2026-04-09T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09242
published_at 2026-04-11T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.0921
published_at 2026-04-12T12:55:00Z
13
value 0.00032
scoring_system epss
scoring_elements 0.09196
published_at 2026-04-13T12:55:00Z
14
value 0.00032
scoring_system epss
scoring_elements 0.09091
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3871
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3871
4
reference_url https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html
reference_id
reference_type
scores
url https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00039.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00039.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWUHF6MRSQ3YO7UUISGLV7MXCAGBW2VD/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWUHF6MRSQ3YO7UUISGLV7MXCAGBW2VD/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROFI6OTWF4GKONNSNEDUCW6LVSSEBZNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROFI6OTWF4GKONNSNEDUCW6LVSSEBZNF/
9
reference_url https://seclists.org/bugtraq/2019/Apr/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/8
10
reference_url https://www.debian.org/security/2019/dsa-4424
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4424
11
reference_url http://www.openwall.com/lists/oss-security/2019/03/18/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/03/18/4
12
reference_url http://www.securityfocus.com/bid/107491
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107491
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924966
reference_id 924966
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924966
14
reference_url https://security.archlinux.org/ASA-201903-13
reference_id ASA-201903-13
reference_type
scores
url https://security.archlinux.org/ASA-201903-13
15
reference_url https://security.archlinux.org/AVG-927
reference_id AVG-927
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-927
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3871
reference_id CVE-2019-3871
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
2
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3871
fixed_packages
0
url pkg:deb/debian/pdns@4.1.6-2?distro=trixie
purl pkg:deb/debian/pdns@4.1.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.1.6-2%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2019-3871
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w9w8-k8h2-b7fc
30
url VCID-xmmj-hpq2-kyad
vulnerability_id VCID-xmmj-hpq2-kyad
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6172
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.0268
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02768
published_at 2026-04-04T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02773
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02776
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02795
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02766
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02748
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02743
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02753
published_at 2026-04-02T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04986
published_at 2026-04-16T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05207
published_at 2026-04-26T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05209
published_at 2026-04-29T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05166
published_at 2026-04-24T12:55:00Z
13
value 0.00019
scoring_system epss
scoring_elements 0.04992
published_at 2026-04-18T12:55:00Z
14
value 0.00019
scoring_system epss
scoring_elements 0.05139
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6172
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830808
reference_id 830808
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830808
fixed_packages
0
url pkg:deb/debian/pdns@4.0.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2016-6172
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xmmj-hpq2-kyad
31
url VCID-xvg6-5zhw-8fdk
vulnerability_id VCID-xvg6-5zhw-8fdk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2120
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32203
published_at 2026-04-29T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32574
published_at 2026-04-01T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32709
published_at 2026-04-02T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32744
published_at 2026-04-04T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32565
published_at 2026-04-07T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32613
published_at 2026-04-16T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32639
published_at 2026-04-09T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32641
published_at 2026-04-11T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32603
published_at 2026-04-12T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32575
published_at 2026-04-13T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.3259
published_at 2026-04-18T12:55:00Z
11
value 0.00131
scoring_system epss
scoring_elements 0.32559
published_at 2026-04-21T12:55:00Z
12
value 0.00131
scoring_system epss
scoring_elements 0.32402
published_at 2026-04-24T12:55:00Z
13
value 0.00131
scoring_system epss
scoring_elements 0.32287
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2120
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
6
reference_url https://security.archlinux.org/ASA-201701-29
reference_id ASA-201701-29
reference_type
scores
url https://security.archlinux.org/ASA-201701-29
7
reference_url https://security.archlinux.org/AVG-147
reference_id AVG-147
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-147
fixed_packages
0
url pkg:deb/debian/pdns@4.0.2-1?distro=trixie
purl pkg:deb/debian/pdns@4.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2016-2120
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xvg6-5zhw-8fdk
32
url VCID-zcxy-ae2g-3kdy
vulnerability_id VCID-zcxy-ae2g-3kdy
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24698
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09628
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09694
published_at 2026-04-02T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09745
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09649
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.0972
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09769
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09782
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.0975
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09734
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.0962
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09592
published_at 2026-04-18T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09737
published_at 2026-04-21T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.0978
published_at 2026-04-24T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09747
published_at 2026-04-26T12:55:00Z
14
value 0.00033
scoring_system epss
scoring_elements 0.09706
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24698
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24698
fixed_packages
0
url pkg:deb/debian/pdns@4.4.0-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2020-24698
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxy-ae2g-3kdy
33
url VCID-zdzj-q58r-5uby
vulnerability_id VCID-zdzj-q58r-5uby
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7074
reference_id
reference_type
scores
0
value 4e-05
scoring_system epss
scoring_elements 0.00166
published_at 2026-04-29T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00169
published_at 2026-04-26T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.00161
published_at 2026-04-02T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00162
published_at 2026-04-08T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00163
published_at 2026-04-13T12:55:00Z
5
value 4e-05
scoring_system epss
scoring_elements 0.00164
published_at 2026-04-12T12:55:00Z
6
value 4e-05
scoring_system epss
scoring_elements 0.00165
published_at 2026-04-18T12:55:00Z
7
value 4e-05
scoring_system epss
scoring_elements 0.00168
published_at 2026-04-21T12:55:00Z
8
value 4e-05
scoring_system epss
scoring_elements 0.0017
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7074
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074
6
reference_url https://security.archlinux.org/ASA-201701-29
reference_id ASA-201701-29
reference_type
scores
url https://security.archlinux.org/ASA-201701-29
7
reference_url https://security.archlinux.org/ASA-201701-30
reference_id ASA-201701-30
reference_type
scores
url https://security.archlinux.org/ASA-201701-30
8
reference_url https://security.archlinux.org/AVG-147
reference_id AVG-147
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-147
9
reference_url https://security.archlinux.org/AVG-148
reference_id AVG-148
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-148
fixed_packages
0
url pkg:deb/debian/pdns@4.0.2-1?distro=trixie
purl pkg:deb/debian/pdns@4.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2016-7074
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdzj-q58r-5uby
34
url VCID-zr5j-8ewr-wkby
vulnerability_id VCID-zr5j-8ewr-wkby
summary Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length.
references
0
reference_url http://doc.powerdns.com/powerdns-advisory-2006-01.html
reference_id
reference_type
scores
url http://doc.powerdns.com/powerdns-advisory-2006-01.html
1
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4251
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06628
published_at 2026-04-29T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-01T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06418
published_at 2026-04-02T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06453
published_at 2026-04-18T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06441
published_at 2026-04-07T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06491
published_at 2026-04-08T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06533
published_at 2026-04-09T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06527
published_at 2026-04-11T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.0652
published_at 2026-04-12T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.0651
published_at 2026-04-13T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-16T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06602
published_at 2026-04-21T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06617
published_at 2026-04-24T12:55:00Z
13
value 0.00024
scoring_system epss
scoring_elements 0.06632
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4251
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4251
4
reference_url http://secunia.com/advisories/22824
reference_id
reference_type
scores
url http://secunia.com/advisories/22824
5
reference_url http://secunia.com/advisories/22903
reference_id
reference_type
scores
url http://secunia.com/advisories/22903
6
reference_url http://secunia.com/advisories/22976
reference_id
reference_type
scores
url http://secunia.com/advisories/22976
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/30270
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/30270
8
reference_url http://www.debian.org/security/2006/dsa-1211
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1211
9
reference_url http://www.securityfocus.com/bid/21037
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21037
10
reference_url http://www.vupen.com/english/advisories/2006/4484
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4484
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398557
reference_id 398557
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398557
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-4251
reference_id CVE-2006-4251
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-4251
fixed_packages
0
url pkg:deb/debian/pdns@2.9.20-4?distro=trixie
purl pkg:deb/debian/pdns@2.9.20-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@2.9.20-4%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
aliases CVE-2006-4251
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zr5j-8ewr-wkby
Risk_score1.9
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie