| 0 |
| url |
VCID-1bej-dqha-zqcm |
| vulnerability_id |
VCID-1bej-dqha-zqcm |
| summary |
PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2301 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22259 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22415 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22583 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22625 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22411 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22493 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22548 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22566 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22525 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22471 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22486 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22483 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22432 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22279 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22265 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2301 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-2301
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1bej-dqha-zqcm |
|
| 1 |
| url |
VCID-1jzb-z2bs-vbeb |
| vulnerability_id |
VCID-1jzb-z2bs-vbeb |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7073 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00443 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00447 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00433 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00435 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00434 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00426 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00423 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00419 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00418 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00414 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00445 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7073 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7073
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1jzb-z2bs-vbeb |
|
| 2 |
| url |
VCID-2m6r-ztcg-gbgu |
| vulnerability_id |
VCID-2m6r-ztcg-gbgu |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7068 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24535 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24578 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24743 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2482 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24858 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2463 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24699 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24747 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24719 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24662 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24675 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24667 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24647 |
| published_at |
2026-04-21T12:55:00Z |
|
| 14 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2459 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7068 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7068
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2m6r-ztcg-gbgu |
|
| 3 |
| url |
VCID-37kj-yg3f-x7g3 |
| vulnerability_id |
VCID-37kj-yg3f-x7g3 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5427 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.85547 |
| scoring_system |
epss |
| scoring_elements |
0.99364 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.85547 |
| scoring_system |
epss |
| scoring_elements |
0.99365 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.85547 |
| scoring_system |
epss |
| scoring_elements |
0.99367 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.85547 |
| scoring_system |
epss |
| scoring_elements |
0.99369 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.85547 |
| scoring_system |
epss |
| scoring_elements |
0.9937 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.85547 |
| scoring_system |
epss |
| scoring_elements |
0.99371 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.85547 |
| scoring_system |
epss |
| scoring_elements |
0.99372 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.85547 |
| scoring_system |
epss |
| scoring_elements |
0.99373 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.85547 |
| scoring_system |
epss |
| scoring_elements |
0.99374 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.85547 |
| scoring_system |
epss |
| scoring_elements |
0.99375 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5427 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5427
|
| risk_score |
1.6 |
| exploitability |
2.0 |
| weighted_severity |
0.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-37kj-yg3f-x7g3 |
|
| 4 |
| url |
VCID-4c2u-n7p5-nfg4 |
| vulnerability_id |
VCID-4c2u-n7p5-nfg4 |
| summary |
PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14626 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12488 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12642 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12605 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12635 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12739 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12785 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12592 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12671 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12723 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12691 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1265 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12606 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1251 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12518 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12632 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14626 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14626
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4c2u-n7p5-nfg4 |
|
| 5 |
| url |
VCID-5efj-fcg6-cuc5 |
| vulnerability_id |
VCID-5efj-fcg6-cuc5 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0067 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0064 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00644 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00637 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00639 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00638 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00632 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00631 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00626 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00628 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0062 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00667 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00666 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00669 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10162 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10162
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5efj-fcg6-cuc5 |
|
| 6 |
| url |
VCID-6nht-qd1p-qbbz |
| vulnerability_id |
VCID-6nht-qd1p-qbbz |
| summary |
Two vulnerabilities have been discovered in PowerDNS, possibly leading to a
Denial of Service and easing cache poisoning attacks. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3337 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05665 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05374 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05411 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05445 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05486 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05507 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05481 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05467 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0546 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05412 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0542 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05591 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05623 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0566 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3337 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-3337
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6nht-qd1p-qbbz |
|
| 7 |
| url |
VCID-8fks-8s21-b7b4 |
| vulnerability_id |
VCID-8fks-8s21-b7b4 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10163 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00736 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00706 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00709 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0071 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.007 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00694 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00687 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00735 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00737 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00738 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10163 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10163
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8fks-8s21-b7b4 |
|
| 8 |
| url |
VCID-bb3a-3ehq-8bhd |
| vulnerability_id |
VCID-bb3a-3ehq-8bhd |
| summary |
PowerDNS (aka pdns) Authoritative Server 3.4.4 before 3.4.7 allows remote attackers to cause a denial of service (assertion failure and server crash) via crafted query packets. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5311 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65053 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.6491 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.6496 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64987 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.6495 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64999 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65013 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65031 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65021 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64993 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.6503 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.6504 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65024 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65043 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65056 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5311 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5311
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bb3a-3ehq-8bhd |
|
| 9 |
| url |
VCID-ch2d-p2ru-23ex |
| vulnerability_id |
VCID-ch2d-p2ru-23ex |
| summary |
PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10851 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2874 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28924 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28811 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29135 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2921 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29262 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29075 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29138 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2918 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29186 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2914 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29088 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29091 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29044 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10851 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10851
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ch2d-p2ru-23ex |
|
| 10 |
| url |
VCID-d13q-prqh-buge |
| vulnerability_id |
VCID-d13q-prqh-buge |
| summary |
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1868 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66161 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66202 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66229 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66198 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66259 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66279 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66266 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66235 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.6627 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66285 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66293 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66307 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1868 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1868
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d13q-prqh-buge |
|
| 11 |
| url |
VCID-ez68-8ben-nuef |
| vulnerability_id |
VCID-ez68-8ben-nuef |
| summary |
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-24696 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22579 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22751 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22795 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22586 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22662 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22713 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22732 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22693 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22636 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22652 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22649 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.226 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22446 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22436 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22434 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-24696 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-24696
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ez68-8ben-nuef |
|
| 12 |
| url |
VCID-gj88-me79-1qb3 |
| vulnerability_id |
VCID-gj88-me79-1qb3 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5426 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.33823 |
| scoring_system |
epss |
| scoring_elements |
0.96923 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.33823 |
| scoring_system |
epss |
| scoring_elements |
0.96931 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.33823 |
| scoring_system |
epss |
| scoring_elements |
0.96936 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.33823 |
| scoring_system |
epss |
| scoring_elements |
0.96939 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.33823 |
| scoring_system |
epss |
| scoring_elements |
0.96947 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.3697 |
| scoring_system |
epss |
| scoring_elements |
0.9715 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.3697 |
| scoring_system |
epss |
| scoring_elements |
0.97154 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.3697 |
| scoring_system |
epss |
| scoring_elements |
0.97155 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.3697 |
| scoring_system |
epss |
| scoring_elements |
0.97156 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.3697 |
| scoring_system |
epss |
| scoring_elements |
0.97163 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.3697 |
| scoring_system |
epss |
| scoring_elements |
0.97165 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.3697 |
| scoring_system |
epss |
| scoring_elements |
0.97169 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.3697 |
| scoring_system |
epss |
| scoring_elements |
0.9717 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.3697 |
| scoring_system |
epss |
| scoring_elements |
0.97171 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.3697 |
| scoring_system |
epss |
| scoring_elements |
0.97173 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5426 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5426
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gj88-me79-1qb3 |
|
| 13 |
| url |
VCID-gvr7-64sm-1kdv |
| vulnerability_id |
VCID-gvr7-64sm-1kdv |
| summary |
PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-36754 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.99175 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.99174 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.99161 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.99162 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.99164 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.99167 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.99169 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.99168 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.9917 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.99171 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.8134 |
| scoring_system |
epss |
| scoring_elements |
0.99173 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-36754 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-36754
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gvr7-64sm-1kdv |
|
| 14 |
| url |
VCID-j5zf-9dpp-qkh6 |
| vulnerability_id |
VCID-j5zf-9dpp-qkh6 |
| summary |
Two vulnerabilities have been discovered in PowerDNS, possibly leading to a
Denial of Service and easing cache poisoning attacks. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5277 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08547 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08495 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08524 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08579 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08497 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08571 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08592 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08587 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08566 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08548 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08441 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08426 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08585 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08598 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08551 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5277 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5277
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j5zf-9dpp-qkh6 |
|
| 15 |
| url |
VCID-jrb1-cuhc-nqa1 |
| vulnerability_id |
VCID-jrb1-cuhc-nqa1 |
| summary |
pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1046 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00056 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00052 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00057 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00058 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00054 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00053 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1046 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1046
|
| risk_score |
4.2 |
| exploitability |
0.5 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jrb1-cuhc-nqa1 |
|
| 16 |
| url |
VCID-keaf-6ca3-vkbc |
| vulnerability_id |
VCID-keaf-6ca3-vkbc |
| summary |
An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15091 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00069 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00071 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00072 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0007 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00068 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00073 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15091 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15091
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-keaf-6ca3-vkbc |
|
| 17 |
| url |
VCID-kray-53q1-6qb4 |
| vulnerability_id |
VCID-kray-53q1-6qb4 |
| summary |
PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a "blank out" of answers to those clients that are allowed to use recursion. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2302 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00556 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00529 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00534 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00526 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00525 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00522 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0052 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00518 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00523 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00557 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00552 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00555 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2302 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-2302
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kray-53q1-6qb4 |
|
| 18 |
| url |
VCID-kzps-gj5k-8yh3 |
| vulnerability_id |
VCID-kzps-gj5k-8yh3 |
| summary |
PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4252 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0186 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01702 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01745 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01759 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01762 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01771 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01766 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01756 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01754 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0182 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01814 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4252 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-4252
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kzps-gj5k-8yh3 |
|
| 19 |
| url |
VCID-m7h2-vam9-1yhn |
| vulnerability_id |
VCID-m7h2-vam9-1yhn |
| summary |
An information disclosure vulnerability in PowerDNS allow remote
attackers to obtain sensitive information. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-17482 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15547 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1559 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15657 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15457 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15544 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15599 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15563 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15525 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15461 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15387 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15392 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15444 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15484 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15483 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15426 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-17482 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-17482
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m7h2-vam9-1yhn |
|
| 20 |
| url |
VCID-mnn7-6732-ykdm |
| vulnerability_id |
VCID-mnn7-6732-ykdm |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7072 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08299 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08294 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08348 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08401 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08386 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08402 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08394 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08359 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08252 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08235 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08398 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08368 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08334 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7072 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7072
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mnn7-6732-ykdm |
|
| 21 |
| url |
VCID-ncn3-gw35-tqd2 |
| vulnerability_id |
VCID-ncn3-gw35-tqd2 |
| summary |
A vulnerability in PowerDNS could lead to a temporary Denial of Service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0428 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00905 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0085 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00856 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00857 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00859 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00863 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00844 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00845 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00898 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00901 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0428 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-0428
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ncn3-gw35-tqd2 |
|
| 22 |
| url |
VCID-nwfa-n5f2-abe7 |
| vulnerability_id |
VCID-nwfa-n5f2-abe7 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5470 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0045 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00435 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00439 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00431 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00428 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0043 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00425 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00424 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00421 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00455 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00453 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5470 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5470
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfa-n5f2-abe7 |
|
| 23 |
| url |
VCID-q6d4-mv53-syhu |
| vulnerability_id |
VCID-q6d4-mv53-syhu |
| summary |
pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissions for the pdns user. Other backends are not affected. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7210 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29111 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29186 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29238 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29049 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29112 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29154 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2916 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31154 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31184 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.3114 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31173 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31123 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0035 |
| scoring_system |
epss |
| scoring_elements |
0.57479 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.0035 |
| scoring_system |
epss |
| scoring_elements |
0.57498 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.0035 |
| scoring_system |
epss |
| scoring_elements |
0.57477 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7210 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-7210
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q6d4-mv53-syhu |
|
| 24 |
| url |
VCID-qbnt-a5xe-2bg6 |
| vulnerability_id |
VCID-qbnt-a5xe-2bg6 |
| summary |
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-24697 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.31989 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32361 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.3251 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32545 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32368 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32417 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32444 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32448 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.3241 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32382 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32418 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32396 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32367 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32194 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32072 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-24697 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-24697
|
| risk_score |
1.2 |
| exploitability |
0.5 |
| weighted_severity |
2.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qbnt-a5xe-2bg6 |
|
| 25 |
| url |
VCID-sa8k-ybav-c3ax |
| vulnerability_id |
VCID-sa8k-ybav-c3ax |
| summary |
The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0038 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22526 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22663 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22838 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22882 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22674 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22749 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22801 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22823 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22785 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22728 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22744 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22739 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22699 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22537 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22528 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0038 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-0038
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sa8k-ybav-c3ax |
|
| 26 |
| url |
VCID-srnu-wj3x-2qd1 |
| vulnerability_id |
VCID-srnu-wj3x-2qd1 |
| summary |
A vulnerability in PowerDNS could allow a remote attacker to create
a Denial of Service condition. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0206 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00212 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00213 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00214 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00211 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0021 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00215 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00222 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00221 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00219 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0206 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-0206
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-srnu-wj3x-2qd1 |
|
| 27 |
| url |
VCID-tqpr-vezf-4ye4 |
| vulnerability_id |
VCID-tqpr-vezf-4ye4 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39134 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.3932 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39343 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39257 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39312 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39329 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.3934 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39302 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39284 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39336 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39308 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39221 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52587 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52597 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.5256 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5230 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5230
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tqpr-vezf-4ye4 |
|
| 28 |
| url |
VCID-w3fn-hwyn-6ba7 |
| vulnerability_id |
VCID-w3fn-hwyn-6ba7 |
| summary |
PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05795 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05717 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0575 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05787 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05506 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05541 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05578 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05575 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05613 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05638 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05611 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05602 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05595 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05545 |
| published_at |
2026-04-16T12:55:00Z |
|
| 14 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05559 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10203 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10203
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w3fn-hwyn-6ba7 |
|
| 29 |
| url |
VCID-w9w8-k8h2-b7fc |
| vulnerability_id |
VCID-w9w8-k8h2-b7fc |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3871 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09193 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09071 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09226 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09272 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09218 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09152 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09156 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09207 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0913 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09211 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09239 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09242 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0921 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09196 |
| published_at |
2026-04-13T12:55:00Z |
|
| 14 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09091 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3871 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-3871
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w9w8-k8h2-b7fc |
|
| 30 |
| url |
VCID-xmmj-hpq2-kyad |
| vulnerability_id |
VCID-xmmj-hpq2-kyad |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6172 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0268 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02768 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02773 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02776 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02795 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02766 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02748 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02743 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02753 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04986 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05207 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05209 |
| published_at |
2026-04-29T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04992 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05139 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6172 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-6172
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xmmj-hpq2-kyad |
|
| 31 |
| url |
VCID-xvg6-5zhw-8fdk |
| vulnerability_id |
VCID-xvg6-5zhw-8fdk |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2120 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32203 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32574 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32709 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32744 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32565 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32613 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32639 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32641 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32603 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32575 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.3259 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32559 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32402 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32287 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2120 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-2120
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xvg6-5zhw-8fdk |
|
| 32 |
| url |
VCID-zcxy-ae2g-3kdy |
| vulnerability_id |
VCID-zcxy-ae2g-3kdy |
| summary |
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-24698 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09628 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09694 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09745 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09649 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.0972 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09769 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09782 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.0975 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09734 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.0962 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09592 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09737 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.0978 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09747 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09706 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-24698 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-24698
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxy-ae2g-3kdy |
|
| 33 |
| url |
VCID-zdzj-q58r-5uby |
| vulnerability_id |
VCID-zdzj-q58r-5uby |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7074 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00166 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00169 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00161 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00162 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00164 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00165 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00168 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0017 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7074 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7074
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zdzj-q58r-5uby |
|
| 34 |
| url |
VCID-zr5j-8ewr-wkby |
| vulnerability_id |
VCID-zr5j-8ewr-wkby |
| summary |
Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06628 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06385 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06418 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06453 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06441 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06533 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06527 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0652 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0651 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06602 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06617 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06632 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4251 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-4251
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zr5j-8ewr-wkby |
|