Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/pdns@4.4.0-1?distro=trixie
Typedeb
Namespacedebian
Namepdns
Version4.4.0-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.6.1-1
Latest_non_vulnerable_version5.0.4-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-ez68-8ben-nuef
vulnerability_id VCID-ez68-8ben-nuef
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24696
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22579
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22751
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22795
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22586
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22662
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22713
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22732
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22693
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22636
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22652
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22649
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.226
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22446
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22436
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22434
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22337
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22423
published_at 2026-05-07T12:55:00Z
17
value 0.00075
scoring_system epss
scoring_elements 0.22499
published_at 2026-05-09T12:55:00Z
18
value 0.00075
scoring_system epss
scoring_elements 0.22467
published_at 2026-05-11T12:55:00Z
19
value 0.00075
scoring_system epss
scoring_elements 0.22483
published_at 2026-05-12T12:55:00Z
20
value 0.00075
scoring_system epss
scoring_elements 0.2256
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24696
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24696
fixed_packages
0
url pkg:deb/debian/pdns@4.4.0-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
5
url pkg:deb/debian/pdns@5.0.4-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.4-1%3Fdistro=trixie
aliases CVE-2020-24696
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ez68-8ben-nuef
1
url VCID-qbnt-a5xe-2bg6
vulnerability_id VCID-qbnt-a5xe-2bg6
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24697
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.31927
published_at 2026-05-14T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32361
published_at 2026-04-01T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.3251
published_at 2026-04-02T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32545
published_at 2026-04-04T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32368
published_at 2026-04-07T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32417
published_at 2026-04-08T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32444
published_at 2026-04-09T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32448
published_at 2026-04-11T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.3241
published_at 2026-04-12T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32382
published_at 2026-04-13T12:55:00Z
10
value 0.00129
scoring_system epss
scoring_elements 0.32418
published_at 2026-04-16T12:55:00Z
11
value 0.00129
scoring_system epss
scoring_elements 0.32396
published_at 2026-04-18T12:55:00Z
12
value 0.00129
scoring_system epss
scoring_elements 0.32367
published_at 2026-04-21T12:55:00Z
13
value 0.00129
scoring_system epss
scoring_elements 0.32194
published_at 2026-04-24T12:55:00Z
14
value 0.00129
scoring_system epss
scoring_elements 0.32072
published_at 2026-04-26T12:55:00Z
15
value 0.00129
scoring_system epss
scoring_elements 0.31989
published_at 2026-04-29T12:55:00Z
16
value 0.00129
scoring_system epss
scoring_elements 0.31846
published_at 2026-05-05T12:55:00Z
17
value 0.00129
scoring_system epss
scoring_elements 0.31918
published_at 2026-05-07T12:55:00Z
18
value 0.00129
scoring_system epss
scoring_elements 0.31926
published_at 2026-05-09T12:55:00Z
19
value 0.00129
scoring_system epss
scoring_elements 0.31833
published_at 2026-05-11T12:55:00Z
20
value 0.00129
scoring_system epss
scoring_elements 0.31856
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24697
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24697
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/pdns@4.4.0-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
5
url pkg:deb/debian/pdns@5.0.4-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.4-1%3Fdistro=trixie
aliases CVE-2020-24697
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbnt-a5xe-2bg6
2
url VCID-zcxy-ae2g-3kdy
vulnerability_id VCID-zcxy-ae2g-3kdy
summary An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24698
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09628
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09694
published_at 2026-04-02T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09745
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09649
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.0972
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09769
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09782
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.0975
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09734
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.0962
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09592
published_at 2026-04-18T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09737
published_at 2026-04-21T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.0978
published_at 2026-04-24T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09747
published_at 2026-04-26T12:55:00Z
14
value 0.00033
scoring_system epss
scoring_elements 0.09706
published_at 2026-04-29T12:55:00Z
15
value 0.00033
scoring_system epss
scoring_elements 0.09619
published_at 2026-05-05T12:55:00Z
16
value 0.00033
scoring_system epss
scoring_elements 0.09785
published_at 2026-05-07T12:55:00Z
17
value 0.00033
scoring_system epss
scoring_elements 0.0985
published_at 2026-05-09T12:55:00Z
18
value 0.00033
scoring_system epss
scoring_elements 0.09824
published_at 2026-05-11T12:55:00Z
19
value 0.00033
scoring_system epss
scoring_elements 0.0986
published_at 2026-05-12T12:55:00Z
20
value 0.00033
scoring_system epss
scoring_elements 0.09926
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24698
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24698
fixed_packages
0
url pkg:deb/debian/pdns@4.4.0-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pdns@4.4.1-1?distro=trixie
purl pkg:deb/debian/pdns@4.4.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-7dc3-qdk8-k7b2
3
vulnerability VCID-chzq-qej6-rkdq
4
vulnerability VCID-g4df-vh2e-abch
5
vulnerability VCID-pfhu-1qdf-p7d5
6
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pdns@4.7.3-2?distro=trixie
purl pkg:deb/debian/pdns@4.7.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/pdns@4.9.7-1?distro=trixie
purl pkg:deb/debian/pdns@4.9.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.9.7-1%3Fdistro=trixie
4
url pkg:deb/debian/pdns@5.0.3-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6pjd-r9ca-rbgg
1
vulnerability VCID-6uz8-kz5m-8ya9
2
vulnerability VCID-chzq-qej6-rkdq
3
vulnerability VCID-g4df-vh2e-abch
4
vulnerability VCID-pfhu-1qdf-p7d5
5
vulnerability VCID-xa6z-cw1x-7qba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.3-1%3Fdistro=trixie
5
url pkg:deb/debian/pdns@5.0.4-1?distro=trixie
purl pkg:deb/debian/pdns@5.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@5.0.4-1%3Fdistro=trixie
aliases CVE-2020-24698
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxy-ae2g-3kdy
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns@4.4.0-1%3Fdistro=trixie