| 0 |
| url |
VCID-12cd-ky6m-qkdg |
| vulnerability_id |
VCID-12cd-ky6m-qkdg |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12244 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26039 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26302 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26342 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26383 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26156 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26224 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26272 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26278 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26233 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26174 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26178 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26153 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26115 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26055 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2605 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26001 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.25891 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.25956 |
| published_at |
2026-05-07T12:55:00Z |
|
| 18 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26013 |
| published_at |
2026-05-09T12:55:00Z |
|
| 19 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.25942 |
| published_at |
2026-05-11T12:55:00Z |
|
| 20 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2596 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12244 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2020-12244
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-12cd-ky6m-qkdg |
|
| 1 |
| url |
VCID-1jzb-z2bs-vbeb |
| vulnerability_id |
VCID-1jzb-z2bs-vbeb |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7073 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00444 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0044 |
| published_at |
2026-05-12T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00433 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00435 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00434 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00426 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00423 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00419 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00418 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00414 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00445 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00447 |
| published_at |
2026-05-09T12:55:00Z |
|
| 13 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00443 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00446 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00449 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00441 |
| published_at |
2026-05-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7073 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2016-7073
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1jzb-z2bs-vbeb |
|
| 2 |
| url |
VCID-26wf-1bqp-sbff |
| vulnerability_id |
VCID-26wf-1bqp-sbff |
| summary |
If you use the zoneToCache function with a malicious authoritative server, an attacker can send a zone that result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33601 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00174 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00212 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00255 |
| published_at |
2026-05-14T12:55:00Z |
|
| 3 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00257 |
| published_at |
2026-05-11T12:55:00Z |
|
| 4 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00254 |
| published_at |
2026-05-12T12:55:00Z |
|
| 5 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00259 |
| published_at |
2026-04-29T12:55:00Z |
|
| 6 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0026 |
| published_at |
2026-05-05T12:55:00Z |
|
| 7 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00261 |
| published_at |
2026-05-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33601 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33601
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-26wf-1bqp-sbff |
|
| 3 |
| url |
VCID-2eyk-9hmz-xybp |
| vulnerability_id |
VCID-2eyk-9hmz-xybp |
| summary |
An attacker can publish a zone containing specific Resource Record Sets. Processing and caching results for these sets can lead to an illegal memory accesses and crash of the Recursor, causing a denial of service.
The remedy is: upgrade to the patched 5.2.1 version.
We would like to thank Volodymyr Ilyin for bringing this issue to our attention. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-30195 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40366 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40298 |
| published_at |
2026-05-12T12:55:00Z |
|
| 2 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40709 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40737 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40661 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40711 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40718 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40735 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40701 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40682 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40727 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40697 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40621 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40521 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40508 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40425 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40282 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.4035 |
| published_at |
2026-05-07T12:55:00Z |
|
| 18 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40369 |
| published_at |
2026-05-09T12:55:00Z |
|
| 19 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40272 |
| published_at |
2026-05-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-30195 |
|
| 1 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| aliases |
CVE-2025-30195
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2eyk-9hmz-xybp |
|
| 4 |
| url |
VCID-2hee-f8gq-rycf |
| vulnerability_id |
VCID-2hee-f8gq-rycf |
| summary |
An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3807 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00114 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00118 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00119 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00115 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00116 |
| published_at |
2026-05-07T12:55:00Z |
|
| 5 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00117 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3807 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2019-3807
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2hee-f8gq-rycf |
|
| 5 |
| url |
VCID-2m6r-ztcg-gbgu |
| vulnerability_id |
VCID-2m6r-ztcg-gbgu |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7068 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24584 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24504 |
| published_at |
2026-05-12T12:55:00Z |
|
| 2 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24743 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2482 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24858 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2463 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24699 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24747 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24719 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24662 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24675 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24667 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24647 |
| published_at |
2026-04-21T12:55:00Z |
|
| 14 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2459 |
| published_at |
2026-04-24T12:55:00Z |
|
| 15 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24578 |
| published_at |
2026-04-26T12:55:00Z |
|
| 16 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24535 |
| published_at |
2026-04-29T12:55:00Z |
|
| 17 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24413 |
| published_at |
2026-05-05T12:55:00Z |
|
| 18 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24491 |
| published_at |
2026-05-07T12:55:00Z |
|
| 19 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24554 |
| published_at |
2026-05-09T12:55:00Z |
|
| 20 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24485 |
| published_at |
2026-05-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7068 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2016-7068
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2m6r-ztcg-gbgu |
|
| 6 |
| url |
VCID-2ugc-uygs-hqb8 |
| vulnerability_id |
VCID-2ugc-uygs-hqb8 |
| summary |
Crafted delegations or IP fragments can poison cached delegations in Recursor. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59024 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00077 |
| published_at |
2026-05-07T12:55:00Z |
|
| 1 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00072 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00074 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00076 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00078 |
| published_at |
2026-05-05T12:55:00Z |
|
| 5 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00075 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00202 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00203 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00204 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59024 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-59024
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2ugc-uygs-hqb8 |
|
| 7 |
| url |
VCID-36qt-fxee-ruae |
| vulnerability_id |
VCID-36qt-fxee-ruae |
| summary |
A remote attacker might be able to cause infinite recursion in PowerDNS Recursor 4.8.0 via a DNS query that retrieves DS records for a misconfigured domain, because QName minimization is used in QM fallback mode. This is fixed in 4.8.1. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22617 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.7787 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.7777 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.778 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77819 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77807 |
| published_at |
2026-05-11T12:55:00Z |
|
| 5 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77825 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77621 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77648 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.7763 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77659 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77664 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.7769 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77674 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77673 |
| published_at |
2026-04-13T12:55:00Z |
|
| 14 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.7771 |
| published_at |
2026-04-16T12:55:00Z |
|
| 15 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77708 |
| published_at |
2026-04-18T12:55:00Z |
|
| 16 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77702 |
| published_at |
2026-04-21T12:55:00Z |
|
| 17 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77733 |
| published_at |
2026-04-24T12:55:00Z |
|
| 18 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77742 |
| published_at |
2026-04-26T12:55:00Z |
|
| 19 |
| value |
0.01064 |
| scoring_system |
epss |
| scoring_elements |
0.77757 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22617 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| aliases |
CVE-2023-22617
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-36qt-fxee-ruae |
|
| 8 |
| url |
VCID-3e3b-z5bh-pban |
| vulnerability_id |
VCID-3e3b-z5bh-pban |
| summary |
An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system's hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have '\0' termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has '\0' termination.) Under some conditions, this issue can lead to the writing of one '\0' byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10030 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08041 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08131 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08174 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08121 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0819 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08208 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08198 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08178 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08161 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08061 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08046 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08204 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08173 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08136 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08097 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08062 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08195 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08264 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08249 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08277 |
| published_at |
2026-05-12T12:55:00Z |
|
| 20 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08331 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10030 |
|
| 1 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2020-10030
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3e3b-z5bh-pban |
|
| 9 |
| url |
VCID-4532-4nm8-6qc8 |
| vulnerability_id |
VCID-4532-4nm8-6qc8 |
| summary |
Multiple vulnerabilities have been found in PowerDNS Recursor, the
worst of which may allow execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4009 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10921 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10985 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10811 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10887 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1094 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10941 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10908 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1075 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10763 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10884 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10844 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10803 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10743 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10686 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1082 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10892 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10877 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10922 |
| published_at |
2026-05-12T12:55:00Z |
|
| 20 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10974 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4009 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2009-4009
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4532-4nm8-6qc8 |
|
| 10 |
| url |
VCID-4c2u-n7p5-nfg4 |
| vulnerability_id |
VCID-4c2u-n7p5-nfg4 |
| summary |
PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14626 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12685 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12593 |
| published_at |
2026-05-11T12:55:00Z |
|
| 2 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1262 |
| published_at |
2026-05-12T12:55:00Z |
|
| 3 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12635 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12739 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12785 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12592 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12671 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12723 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12691 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1265 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12606 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1251 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12518 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12632 |
| published_at |
2026-04-21T12:55:00Z |
|
| 15 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12642 |
| published_at |
2026-04-24T12:55:00Z |
|
| 16 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12605 |
| published_at |
2026-04-26T12:55:00Z |
|
| 17 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12488 |
| published_at |
2026-04-29T12:55:00Z |
|
| 18 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12398 |
| published_at |
2026-05-05T12:55:00Z |
|
| 19 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12538 |
| published_at |
2026-05-07T12:55:00Z |
|
| 20 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12596 |
| published_at |
2026-05-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14626 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2018-14626
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4c2u-n7p5-nfg4 |
|
| 11 |
| url |
VCID-5afe-ws96-nqh9 |
| vulnerability_id |
VCID-5afe-ws96-nqh9 |
| summary |
By publishing and querying a crafted zone an attacker can cause allocation of large entries in the negative and aggressive NSEC(3) caches. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33258 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00128 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00129 |
| published_at |
2026-05-09T12:55:00Z |
|
| 2 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00127 |
| published_at |
2026-05-12T12:55:00Z |
|
| 3 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00114 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00082 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00131 |
| published_at |
2026-04-29T12:55:00Z |
|
| 6 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0013 |
| published_at |
2026-05-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33258 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33258
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5afe-ws96-nqh9 |
|
| 12 |
| url |
VCID-66sa-bc5p-jqde |
| vulnerability_id |
VCID-66sa-bc5p-jqde |
| summary |
Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-50387 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97939 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97928 |
| published_at |
2026-05-07T12:55:00Z |
|
| 2 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97931 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97926 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.9792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97921 |
| published_at |
2026-04-26T12:55:00Z |
|
| 6 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97896 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97922 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97914 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97913 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97912 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97909 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97906 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97901 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97898 |
| published_at |
2026-04-04T12:55:00Z |
|
| 15 |
| value |
0.51989 |
| scoring_system |
epss |
| scoring_elements |
0.97935 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-50387 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-50387
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-66sa-bc5p-jqde |
|
| 13 |
| url |
VCID-67tu-cpzn-t7ep |
| vulnerability_id |
VCID-67tu-cpzn-t7ep |
| summary |
Use of insufficient randomness in PowerDNS Recursor might lead to DNS cache
poisoning. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3217 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0019 |
| published_at |
2026-05-09T12:55:00Z |
|
| 1 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00184 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00185 |
| published_at |
2026-05-14T12:55:00Z |
|
| 3 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00186 |
| published_at |
2026-05-12T12:55:00Z |
|
| 4 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00183 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00187 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00188 |
| published_at |
2026-05-11T12:55:00Z |
|
| 7 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00191 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00192 |
| published_at |
2026-05-05T12:55:00Z |
|
| 9 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00189 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3217 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2008-3217
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-67tu-cpzn-t7ep |
|
| 14 |
| url |
VCID-7dc3-qdk8-k7b2 |
| vulnerability_id |
VCID-7dc3-qdk8-k7b2 |
| summary |
In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07689 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07652 |
| published_at |
2026-05-09T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07627 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07648 |
| published_at |
2026-05-12T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07406 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07449 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0743 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0751 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07496 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07484 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07393 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07522 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07482 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07471 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07439 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07584 |
| published_at |
2026-05-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27227 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27227
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7dc3-qdk8-k7b2 |
|
| 15 |
| url |
VCID-829g-d7jw-sych |
| vulnerability_id |
VCID-829g-d7jw-sych |
| summary |
A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25583 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00858 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00872 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00866 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00861 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00856 |
| published_at |
2026-05-11T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0085 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00833 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00834 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00838 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00835 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00824 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00818 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00819 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00823 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00869 |
| published_at |
2026-04-21T12:55:00Z |
|
| 15 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0087 |
| published_at |
2026-04-24T12:55:00Z |
|
| 16 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00873 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25583 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| aliases |
CVE-2024-25583
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-829g-d7jw-sych |
|
| 16 |
| url |
VCID-8hf9-emba-wbdq |
| vulnerability_id |
VCID-8hf9-emba-wbdq |
| summary |
Multiple vulnerabilities have been found in PowerDNS Recursor, the
worst of which may allow execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4010 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00333 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00338 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00336 |
| published_at |
2026-05-05T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00327 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00325 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00324 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00323 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00316 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00343 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00342 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00337 |
| published_at |
2026-04-29T12:55:00Z |
|
| 12 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00341 |
| published_at |
2026-05-09T12:55:00Z |
|
| 13 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00335 |
| published_at |
2026-05-11T12:55:00Z |
|
| 14 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00328 |
| published_at |
2026-05-12T12:55:00Z |
|
| 15 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00331 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4010 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2009-4010
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8hf9-emba-wbdq |
|
| 17 |
| url |
VCID-8tar-s444-zfac |
| vulnerability_id |
VCID-8tar-s444-zfac |
| summary |
PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37428 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16749 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16879 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16935 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16718 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16803 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16858 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16836 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16791 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16732 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16668 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16676 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16714 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16619 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16609 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16574 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.1644 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.1656 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16664 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.1663 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16665 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37428 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-37428
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8tar-s444-zfac |
|
| 18 |
| url |
VCID-9p7x-52ad-vbh6 |
| vulnerability_id |
VCID-9p7x-52ad-vbh6 |
| summary |
An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14644 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05608 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05605 |
| published_at |
2026-05-12T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05189 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05233 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05265 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0529 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05325 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05347 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05314 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05303 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05292 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05238 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0524 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05392 |
| published_at |
2026-04-21T12:55:00Z |
|
| 14 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05431 |
| published_at |
2026-04-24T12:55:00Z |
|
| 15 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05472 |
| published_at |
2026-04-26T12:55:00Z |
|
| 16 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05475 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05521 |
| published_at |
2026-05-07T12:55:00Z |
|
| 18 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05597 |
| published_at |
2026-05-09T12:55:00Z |
|
| 19 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05604 |
| published_at |
2026-05-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14644 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2018-14644
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9p7x-52ad-vbh6 |
|
| 19 |
| url |
VCID-a7xd-fyh3-xuaq |
| vulnerability_id |
VCID-a7xd-fyh3-xuaq |
| summary |
An issue has been found in the DNSSEC parsing code of PowerDNS Recursor from 4.0.0 up to and including 4.0.6 leading to a memory leak when parsing specially crafted DNSSEC ECDSA keys. These keys are only parsed when validation is enabled by setting dnssec to a value other than off or process-no-validate (default). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15094 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00209 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0021 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00211 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00207 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00587 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00592 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00634 |
| published_at |
2026-05-09T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00632 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00635 |
| published_at |
2026-04-29T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0064 |
| published_at |
2026-05-05T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00637 |
| published_at |
2026-05-07T12:55:00Z |
|
| 11 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00626 |
| published_at |
2026-05-11T12:55:00Z |
|
| 12 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00621 |
| published_at |
2026-05-12T12:55:00Z |
|
| 13 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00624 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00595 |
| published_at |
2026-04-11T12:55:00Z |
|
| 15 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00591 |
| published_at |
2026-04-12T12:55:00Z |
|
| 16 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00593 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15094 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2017-15094
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a7xd-fyh3-xuaq |
|
| 20 |
| url |
VCID-anab-r9ty-1yh1 |
| vulnerability_id |
VCID-anab-r9ty-1yh1 |
| summary |
An RPZ sent by a malicious authoritative server can result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33600 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04891 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04927 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06622 |
| published_at |
2026-05-14T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06595 |
| published_at |
2026-05-11T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06606 |
| published_at |
2026-05-12T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06375 |
| published_at |
2026-04-29T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06393 |
| published_at |
2026-05-05T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06509 |
| published_at |
2026-05-07T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06584 |
| published_at |
2026-05-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33600 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33600
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-anab-r9ty-1yh1 |
|
| 21 |
| url |
VCID-bb3a-3ehq-8bhd |
| vulnerability_id |
VCID-bb3a-3ehq-8bhd |
| summary |
PowerDNS (aka pdns) Authoritative Server 3.4.4 before 3.4.7 allows remote attackers to cause a denial of service (assertion failure and server crash) via crafted query packets. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5311 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65171 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.6491 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.6496 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64987 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.6495 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64999 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65013 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65031 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65021 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64993 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.6503 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.6504 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65024 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65043 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65056 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65053 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65035 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65082 |
| published_at |
2026-05-07T12:55:00Z |
|
| 18 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65125 |
| published_at |
2026-05-09T12:55:00Z |
|
| 19 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65094 |
| published_at |
2026-05-11T12:55:00Z |
|
| 20 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65115 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5311 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2015-5311
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bb3a-3ehq-8bhd |
|
| 22 |
| url |
VCID-cdzz-8tc8-jucu |
| vulnerability_id |
VCID-cdzz-8tc8-jucu |
| summary |
Crafted delegations or IP fragments can poison cached delegations in Recursor. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59023 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00345 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00365 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0034 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00368 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00356 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00353 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0035 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00347 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00505 |
| published_at |
2026-05-14T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00504 |
| published_at |
2026-05-11T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00502 |
| published_at |
2026-05-12T12:55:00Z |
|
| 11 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00428 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00487 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00485 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00486 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00512 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00518 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00517 |
| published_at |
2026-05-07T12:55:00Z |
|
| 18 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00511 |
| published_at |
2026-05-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59023 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-59023
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cdzz-8tc8-jucu |
|
| 23 |
| url |
VCID-ch2d-p2ru-23ex |
| vulnerability_id |
VCID-ch2d-p2ru-23ex |
| summary |
PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10851 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28693 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28593 |
| published_at |
2026-05-11T12:55:00Z |
|
| 2 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28615 |
| published_at |
2026-05-12T12:55:00Z |
|
| 3 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29135 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2921 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29262 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29075 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29138 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2918 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29186 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2914 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29088 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29091 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29044 |
| published_at |
2026-04-21T12:55:00Z |
|
| 15 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28924 |
| published_at |
2026-04-24T12:55:00Z |
|
| 16 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28811 |
| published_at |
2026-04-26T12:55:00Z |
|
| 17 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2874 |
| published_at |
2026-04-29T12:55:00Z |
|
| 18 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2859 |
| published_at |
2026-05-05T12:55:00Z |
|
| 19 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2865 |
| published_at |
2026-05-07T12:55:00Z |
|
| 20 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2867 |
| published_at |
2026-05-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10851 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2018-10851
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ch2d-p2ru-23ex |
|
| 24 |
| url |
VCID-chzq-qej6-rkdq |
| vulnerability_id |
VCID-chzq-qej6-rkdq |
| summary |
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33257 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01593 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01614 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01581 |
| published_at |
2026-05-12T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01586 |
| published_at |
2026-05-11T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01588 |
| published_at |
2026-05-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01592 |
| published_at |
2026-05-07T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01597 |
| published_at |
2026-05-05T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00992 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00988 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33257 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33257
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-chzq-qej6-rkdq |
|
| 25 |
| url |
VCID-d13q-prqh-buge |
| vulnerability_id |
VCID-d13q-prqh-buge |
| summary |
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1868 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66161 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66202 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66229 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66198 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66259 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66279 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66266 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66235 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.6627 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66285 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66293 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66307 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66286 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66329 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66372 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66344 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66365 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66424 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1868 |
|
| 1 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2015-1868
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d13q-prqh-buge |
|
| 26 |
| url |
VCID-d4km-jg6b-2kh3 |
| vulnerability_id |
VCID-d4km-jg6b-2kh3 |
| summary |
An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16855 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95515 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95413 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95428 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95432 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95438 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95441 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95445 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95447 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95456 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.9546 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95464 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95466 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95467 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95477 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95485 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95492 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95498 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.19834 |
| scoring_system |
epss |
| scoring_elements |
0.95502 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16855 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2018-16855
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d4km-jg6b-2kh3 |
|
| 27 |
| url |
VCID-e3e7-jd2u-fbgk |
| vulnerability_id |
VCID-e3e7-jd2u-fbgk |
| summary |
The recursor in PowerDNS before 3.0.1 allows remote attackers to cause a denial of service (application crash) via malformed EDNS0 packets. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-2069 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02313 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02389 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02394 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02415 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02391 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02379 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02378 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02362 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02367 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02466 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02453 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02442 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02505 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02477 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02493 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02532 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02529 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02533 |
| published_at |
2026-05-12T12:55:00Z |
|
| 20 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02557 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-2069 |
|
| 1 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2006-2069
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e3e7-jd2u-fbgk |
|
| 28 |
| url |
VCID-f1cn-ufjb-ffcd |
| vulnerability_id |
VCID-f1cn-ufjb-ffcd |
| summary |
PowerDNS: PowerDNS: Assertion failure due to crafted DNS records |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59029 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01011 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01002 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01013 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01015 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01003 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00714 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0076 |
| published_at |
2026-05-05T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00764 |
| published_at |
2026-05-07T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00721 |
| published_at |
2026-05-09T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00717 |
| published_at |
2026-05-11T12:55:00Z |
|
| 10 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0071 |
| published_at |
2026-05-12T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00834 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00974 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00976 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0098 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00973 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00835 |
| published_at |
2026-04-11T12:55:00Z |
|
| 17 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00829 |
| published_at |
2026-04-16T12:55:00Z |
|
| 18 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0083 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59029 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| aliases |
CVE-2025-59029
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f1cn-ufjb-ffcd |
|
| 29 |
| url |
VCID-h73s-nkfg-sqgc |
| vulnerability_id |
VCID-h73s-nkfg-sqgc |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15120 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.55985 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56096 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56116 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56147 |
| published_at |
2026-05-14T12:55:00Z |
|
| 4 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56152 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56164 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.5614 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56124 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56158 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56161 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.5613 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56056 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56077 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56053 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56006 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56054 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56115 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56065 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56088 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15120 |
|
| 1 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2017-15120
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h73s-nkfg-sqgc |
|
| 30 |
| url |
VCID-htr2-rwgm-47ed |
| vulnerability_id |
VCID-htr2-rwgm-47ed |
| summary |
A vulnerability in PowerDNS Recursor could lead to a Denial of
Service condition. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25829 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57449 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57287 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57369 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57391 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57366 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57418 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57421 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57436 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57415 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57396 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57423 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57419 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57397 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57353 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57375 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57355 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57303 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57347 |
| published_at |
2026-05-07T12:55:00Z |
|
| 18 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.5741 |
| published_at |
2026-05-09T12:55:00Z |
|
| 19 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.5736 |
| published_at |
2026-05-11T12:55:00Z |
|
| 20 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57385 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25829 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2020-25829
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-htr2-rwgm-47ed |
|
| 31 |
| url |
VCID-jfe5-j391-dubt |
| vulnerability_id |
VCID-jfe5-j391-dubt |
| summary |
Use of insufficient randomness in PowerDNS Recursor might lead to DNS cache
poisoning. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1637 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07459 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07574 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07616 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07589 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07648 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07666 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07668 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07654 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07639 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07553 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07693 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07643 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0762 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07584 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0757 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07713 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07784 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07777 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07801 |
| published_at |
2026-05-12T12:55:00Z |
|
| 20 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07851 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1637 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2008-1637
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jfe5-j391-dubt |
|
| 32 |
| url |
VCID-k3re-ss39-zugm |
| vulnerability_id |
VCID-k3re-ss39-zugm |
| summary |
An attacker can send replies that result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service. Cookies are disabled by default. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33262 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00196 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00247 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00271 |
| published_at |
2026-05-14T12:55:00Z |
|
| 3 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00275 |
| published_at |
2026-05-11T12:55:00Z |
|
| 4 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00272 |
| published_at |
2026-05-12T12:55:00Z |
|
| 5 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00276 |
| published_at |
2026-05-05T12:55:00Z |
|
| 6 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00278 |
| published_at |
2026-05-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33262 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33262
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k3re-ss39-zugm |
|
| 33 |
| url |
VCID-kzps-gj5k-8yh3 |
| vulnerability_id |
VCID-kzps-gj5k-8yh3 |
| summary |
PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4252 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01816 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01702 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01745 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01759 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01762 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01771 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01766 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01756 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01754 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-05-11T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0182 |
| published_at |
2026-05-05T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01814 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0186 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01807 |
| published_at |
2026-05-07T12:55:00Z |
|
| 14 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01825 |
| published_at |
2026-05-09T12:55:00Z |
|
| 15 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01808 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4252 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2006-4252
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kzps-gj5k-8yh3 |
|
| 34 |
| url |
VCID-m445-c6a1-uugf |
| vulnerability_id |
VCID-m445-c6a1-uugf |
| summary |
Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0398 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00208 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00209 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00206 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00205 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00207 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00244 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00282 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00281 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00698 |
| published_at |
2026-05-11T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00704 |
| published_at |
2026-05-09T12:55:00Z |
|
| 10 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00692 |
| published_at |
2026-05-12T12:55:00Z |
|
| 11 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00697 |
| published_at |
2026-05-14T12:55:00Z |
|
| 12 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00708 |
| published_at |
2026-05-07T12:55:00Z |
|
| 13 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00714 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0398 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-0398
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m445-c6a1-uugf |
|
| 35 |
| url |
VCID-mbq1-b3dr-1uc4 |
| vulnerability_id |
VCID-mbq1-b3dr-1uc4 |
| summary |
A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15092 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00065 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00064 |
| published_at |
2026-05-11T12:55:00Z |
|
| 2 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00061 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00062 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00067 |
| published_at |
2026-05-05T12:55:00Z |
|
| 5 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00066 |
| published_at |
2026-05-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15092 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2017-15092
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mbq1-b3dr-1uc4 |
|
| 36 |
| url |
VCID-mkcs-362g-t7aq |
| vulnerability_id |
VCID-mkcs-362g-t7aq |
| summary |
Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.This issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-26437 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0116 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01155 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01163 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01348 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01341 |
| published_at |
2026-05-11T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0134 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01351 |
| published_at |
2026-05-14T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01357 |
| published_at |
2026-05-05T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0087 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00824 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00833 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00835 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00839 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00836 |
| published_at |
2026-04-09T12:55:00Z |
|
| 14 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00834 |
| published_at |
2026-04-02T12:55:00Z |
|
| 15 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00819 |
| published_at |
2026-04-12T12:55:00Z |
|
| 16 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0082 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-26437 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-26437
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mkcs-362g-t7aq |
|
| 37 |
| url |
VCID-mzne-k7ry-pubm |
| vulnerability_id |
VCID-mzne-k7ry-pubm |
| summary |
Having many concurrent transfers of the same RPZ can lead to inconsistent RPZ data, use after free and/or a crash of the recursor. Normally concurrent transfers of the same RPZ zone can only occur with a malfunctioning RPZ provider. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33259 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00042 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0004 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00041 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00038 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00028 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00039 |
| published_at |
2026-05-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33259 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33259
|
| risk_score |
1.2 |
| exploitability |
0.5 |
| weighted_severity |
2.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mzne-k7ry-pubm |
|
| 38 |
| url |
VCID-n2k6-nfxs-7ydj |
| vulnerability_id |
VCID-n2k6-nfxs-7ydj |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10995 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25475 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25677 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25789 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25558 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25631 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25687 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.2559 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25592 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25576 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25548 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.255 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25493 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25445 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25331 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25398 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25459 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.2538 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25397 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10995 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2020-10995
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n2k6-nfxs-7ydj |
|
| 39 |
| url |
VCID-nfhz-964w-x3e7 |
| vulnerability_id |
VCID-nfhz-964w-x3e7 |
| summary |
Multiple vulnerabilities have been found in PowerDNS Recursor, the
worst of which may allow execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8601 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73491 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73265 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73274 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73298 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.7327 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73306 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73319 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73343 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73324 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73316 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.7336 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73368 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73394 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73407 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73405 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73401 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73427 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73451 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73411 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73433 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8601 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2014-8601
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nfhz-964w-x3e7 |
|
| 40 |
| url |
VCID-nwfa-n5f2-abe7 |
| vulnerability_id |
VCID-nwfa-n5f2-abe7 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5470 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00451 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00435 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00439 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00431 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00428 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0043 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00425 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00424 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00421 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00455 |
| published_at |
2026-05-05T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00453 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0045 |
| published_at |
2026-04-29T12:55:00Z |
|
| 12 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00456 |
| published_at |
2026-05-07T12:55:00Z |
|
| 13 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00454 |
| published_at |
2026-05-09T12:55:00Z |
|
| 14 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00448 |
| published_at |
2026-05-11T12:55:00Z |
|
| 15 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00447 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5470 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2015-5470
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfa-n5f2-abe7 |
|
| 41 |
| url |
VCID-pfhu-1qdf-p7d5 |
| vulnerability_id |
VCID-pfhu-1qdf-p7d5 |
| summary |
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33260 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01593 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01614 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01581 |
| published_at |
2026-05-12T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01586 |
| published_at |
2026-05-11T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01588 |
| published_at |
2026-05-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01592 |
| published_at |
2026-05-07T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01597 |
| published_at |
2026-05-05T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00992 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00988 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33260 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33260
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pfhu-1qdf-p7d5 |
|
| 42 |
| url |
VCID-pjbp-1jgm-s3cg |
| vulnerability_id |
VCID-pjbp-1jgm-s3cg |
| summary |
Crafted zones can lead to increased incoming network traffic. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24027 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01098 |
| published_at |
2026-05-12T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01108 |
| published_at |
2026-05-14T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01103 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01111 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01115 |
| published_at |
2026-05-07T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01117 |
| published_at |
2026-05-05T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00324 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00323 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00339 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00402 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00318 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00337 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00329 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00326 |
| published_at |
2026-04-08T12:55:00Z |
|
| 14 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00327 |
| published_at |
2026-04-09T12:55:00Z |
|
| 15 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00325 |
| published_at |
2026-04-11T12:55:00Z |
|
| 16 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00527 |
| published_at |
2026-04-26T12:55:00Z |
|
| 17 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00525 |
| published_at |
2026-04-24T12:55:00Z |
|
| 18 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0053 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24027 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-24027
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pjbp-1jgm-s3cg |
|
| 43 |
| url |
VCID-rcd7-knv1-xbgd |
| vulnerability_id |
VCID-rcd7-knv1-xbgd |
| summary |
Unspecified vulnerability in PowerDNS Recursor (aka pdns_recursor) 3.6.x before 3.6.1 allows remote attackers to cause a denial of service (crash) via an unknown sequence of malformed packets. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3614 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00882 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00844 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0085 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00852 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00856 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00854 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00845 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00839 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0084 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00892 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00894 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00897 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00895 |
| published_at |
2026-05-05T12:55:00Z |
|
| 13 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0089 |
| published_at |
2026-05-07T12:55:00Z |
|
| 14 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00885 |
| published_at |
2026-05-09T12:55:00Z |
|
| 15 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0088 |
| published_at |
2026-05-11T12:55:00Z |
|
| 16 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00874 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3614 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2014-3614
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rcd7-knv1-xbgd |
|
| 44 |
| url |
VCID-s6ds-tuus-n7hr |
| vulnerability_id |
VCID-s6ds-tuus-n7hr |
| summary |
In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14196 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07108 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07087 |
| published_at |
2026-05-12T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06566 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06634 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06679 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06714 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06748 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06747 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0674 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06733 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06664 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06655 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06812 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06817 |
| published_at |
2026-04-24T12:55:00Z |
|
| 15 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06837 |
| published_at |
2026-04-26T12:55:00Z |
|
| 16 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0685 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07004 |
| published_at |
2026-05-07T12:55:00Z |
|
| 18 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07092 |
| published_at |
2026-05-09T12:55:00Z |
|
| 19 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07073 |
| published_at |
2026-05-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14196 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2020-14196
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s6ds-tuus-n7hr |
|
| 45 |
| url |
VCID-tcp4-6r2n-6uer |
| vulnerability_id |
VCID-tcp4-6r2n-6uer |
| summary |
When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor's ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor's configuration. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15093 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00285 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00288 |
| published_at |
2026-05-11T12:55:00Z |
|
| 2 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00293 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0029 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00282 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0028 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00279 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00276 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00275 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00272 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00296 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00297 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00295 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00289 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00291 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00292 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00284 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15093 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2017-15093
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tcp4-6r2n-6uer |
|
| 46 |
| url |
VCID-umcq-ztbz-qfb2 |
| vulnerability_id |
VCID-umcq-ztbz-qfb2 |
| summary |
An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59030 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17494 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19454 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19424 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19416 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19561 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19513 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20306 |
| published_at |
2026-04-29T12:55:00Z |
|
| 7 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20341 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20346 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.2047 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23608 |
| published_at |
2026-05-14T12:55:00Z |
|
| 11 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23556 |
| published_at |
2026-05-09T12:55:00Z |
|
| 12 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23508 |
| published_at |
2026-05-11T12:55:00Z |
|
| 13 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23524 |
| published_at |
2026-05-12T12:55:00Z |
|
| 14 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24128 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2459 |
| published_at |
2026-04-07T12:55:00Z |
|
| 16 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24706 |
| published_at |
2026-04-09T12:55:00Z |
|
| 17 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24659 |
| published_at |
2026-04-08T12:55:00Z |
|
| 18 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24816 |
| published_at |
2026-04-04T12:55:00Z |
|
| 19 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24777 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59030 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-59030
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-umcq-ztbz-qfb2 |
|
| 47 |
| url |
VCID-urr2-qrfd-vfeh |
| vulnerability_id |
VCID-urr2-qrfd-vfeh |
| summary |
An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15090 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00048 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00051 |
| published_at |
2026-05-11T12:55:00Z |
|
| 2 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00049 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0005 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00052 |
| published_at |
2026-05-12T12:55:00Z |
|
| 5 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00053 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15090 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2017-15090
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-urr2-qrfd-vfeh |
|
| 48 |
| url |
VCID-v9yz-hcqv-83gu |
| vulnerability_id |
VCID-v9yz-hcqv-83gu |
| summary |
A zone transition from NSEC to NSEC3 might trigger an internal inconsistency and cause a denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33261 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00049 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00076 |
| published_at |
2026-05-14T12:55:00Z |
|
| 2 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00075 |
| published_at |
2026-05-12T12:55:00Z |
|
| 3 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00074 |
| published_at |
2026-05-11T12:55:00Z |
|
| 4 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00078 |
| published_at |
2026-05-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33261 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33261
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v9yz-hcqv-83gu |
|
| 49 |
| url |
VCID-vprj-j7u6-zbe7 |
| vulnerability_id |
VCID-vprj-j7u6-zbe7 |
| summary |
Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-50868 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93778 |
| published_at |
2026-05-12T12:55:00Z |
|
| 1 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93774 |
| published_at |
2026-05-11T12:55:00Z |
|
| 2 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.9377 |
| published_at |
2026-05-09T12:55:00Z |
|
| 3 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.9373 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93684 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93791 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93741 |
| published_at |
2026-04-29T12:55:00Z |
|
| 7 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93742 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93745 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.9374 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93694 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93696 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93706 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93708 |
| published_at |
2026-04-09T12:55:00Z |
|
| 14 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93712 |
| published_at |
2026-04-12T12:55:00Z |
|
| 15 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93713 |
| published_at |
2026-04-13T12:55:00Z |
|
| 16 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93737 |
| published_at |
2026-04-18T12:55:00Z |
|
| 17 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.93761 |
| published_at |
2026-05-07T12:55:00Z |
|
| 18 |
| value |
0.11802 |
| scoring_system |
epss |
| scoring_elements |
0.9375 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-50868 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-50868
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vprj-j7u6-zbe7 |
|
| 50 |
| url |
VCID-vua1-5kz6-hban |
| vulnerability_id |
VCID-vua1-5kz6-hban |
| summary |
An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3806 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06756 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06701 |
| published_at |
2026-05-09T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06708 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06725 |
| published_at |
2026-05-12T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0623 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06264 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06283 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0626 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06305 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06346 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06338 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06333 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06322 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06274 |
| published_at |
2026-04-16T12:55:00Z |
|
| 14 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06287 |
| published_at |
2026-04-18T12:55:00Z |
|
| 15 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06434 |
| published_at |
2026-04-21T12:55:00Z |
|
| 16 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06449 |
| published_at |
2026-04-24T12:55:00Z |
|
| 17 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06473 |
| published_at |
2026-04-26T12:55:00Z |
|
| 18 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06486 |
| published_at |
2026-04-29T12:55:00Z |
|
| 19 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06509 |
| published_at |
2026-05-05T12:55:00Z |
|
| 20 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06637 |
| published_at |
2026-05-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3806 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2019-3806
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vua1-5kz6-hban |
|
| 51 |
| url |
VCID-wmgd-z2j3-h7d9 |
| vulnerability_id |
VCID-wmgd-z2j3-h7d9 |
| summary |
An attacker can publish a zone containing specific Resource Record Sets. Repeatedly processing and caching results for these sets can lead to a denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25590 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31377 |
| published_at |
2026-05-12T12:55:00Z |
|
| 1 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31446 |
| published_at |
2026-05-14T12:55:00Z |
|
| 2 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31353 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32036 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32076 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.319 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31952 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31981 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31984 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31944 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31911 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31923 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31895 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31728 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31601 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31517 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31367 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31437 |
| published_at |
2026-05-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25590 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-25590
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wmgd-z2j3-h7d9 |
|
| 52 |
| url |
VCID-wywf-pmyt-zud4 |
| vulnerability_id |
VCID-wywf-pmyt-zud4 |
| summary |
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-30192 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09691 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09742 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13327 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.1341 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.1346 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13399 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13434 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13352 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14882 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14876 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14936 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14975 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14977 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14919 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14794 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16403 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16368 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16474 |
| published_at |
2026-05-14T12:55:00Z |
|
| 18 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16402 |
| published_at |
2026-05-12T12:55:00Z |
|
| 19 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16297 |
| published_at |
2026-05-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-30192 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-30192
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wywf-pmyt-zud4 |
|
| 53 |
| url |
VCID-xasd-r2rc-2ufq |
| vulnerability_id |
VCID-xasd-r2rc-2ufq |
| summary |
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33256 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00128 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00131 |
| published_at |
2026-05-07T12:55:00Z |
|
| 2 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0013 |
| published_at |
2026-05-09T12:55:00Z |
|
| 3 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00114 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00083 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
3e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00132 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33256 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33256
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xasd-r2rc-2ufq |
|
| 54 |
| url |
VCID-xxxv-krt4-tka1 |
| vulnerability_id |
VCID-xxxv-krt4-tka1 |
| summary |
Improper input validation bugs in DNSSEC validators components in PowerDNS version 4.1.0 allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000003 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03954 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03993 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0401 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04024 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04049 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04021 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04007 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03979 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03962 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03974 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04099 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04112 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0413 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04132 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04159 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04196 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.042 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04204 |
| published_at |
2026-05-12T12:55:00Z |
|
| 20 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0422 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000003 |
|
| 1 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2018-1000003
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xxxv-krt4-tka1 |
|
| 55 |
| url |
VCID-zdzj-q58r-5uby |
| vulnerability_id |
VCID-zdzj-q58r-5uby |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7074 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0016 |
| published_at |
2026-05-12T12:55:00Z |
|
| 1 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00167 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00161 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00162 |
| published_at |
2026-05-14T12:55:00Z |
|
| 4 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00164 |
| published_at |
2026-05-09T12:55:00Z |
|
| 6 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00165 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00168 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0017 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00169 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00166 |
| published_at |
2026-05-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7074 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2016-7074
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zdzj-q58r-5uby |
|
| 56 |
| url |
VCID-zr5j-8ewr-wkby |
| vulnerability_id |
VCID-zr5j-8ewr-wkby |
| summary |
Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06385 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06418 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06453 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06441 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06533 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06527 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0652 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0651 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06602 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06617 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06632 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06628 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06647 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06775 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06841 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06844 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06862 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4251 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| purl |
pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-26wf-1bqp-sbff |
|
| 1 |
| vulnerability |
VCID-2ugc-uygs-hqb8 |
|
| 2 |
| vulnerability |
VCID-5afe-ws96-nqh9 |
|
| 3 |
| vulnerability |
VCID-66sa-bc5p-jqde |
|
| 4 |
| vulnerability |
VCID-7dc3-qdk8-k7b2 |
|
| 5 |
| vulnerability |
VCID-8tar-s444-zfac |
|
| 6 |
| vulnerability |
VCID-anab-r9ty-1yh1 |
|
| 7 |
| vulnerability |
VCID-cdzz-8tc8-jucu |
|
| 8 |
| vulnerability |
VCID-chzq-qej6-rkdq |
|
| 9 |
| vulnerability |
VCID-k3re-ss39-zugm |
|
| 10 |
| vulnerability |
VCID-m445-c6a1-uugf |
|
| 11 |
| vulnerability |
VCID-mkcs-362g-t7aq |
|
| 12 |
| vulnerability |
VCID-mzne-k7ry-pubm |
|
| 13 |
| vulnerability |
VCID-pfhu-1qdf-p7d5 |
|
| 14 |
| vulnerability |
VCID-pjbp-1jgm-s3cg |
|
| 15 |
| vulnerability |
VCID-umcq-ztbz-qfb2 |
|
| 16 |
| vulnerability |
VCID-v9yz-hcqv-83gu |
|
| 17 |
| vulnerability |
VCID-vprj-j7u6-zbe7 |
|
| 18 |
| vulnerability |
VCID-wmgd-z2j3-h7d9 |
|
| 19 |
| vulnerability |
VCID-wywf-pmyt-zud4 |
|
| 20 |
| vulnerability |
VCID-xasd-r2rc-2ufq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| aliases |
CVE-2006-4251
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zr5j-8ewr-wkby |
|