{"url":"http://public2.vulnerablecode.io/api/packages/934679?format=json","purl":"pkg:deb/debian/pdns-recursor@4.3.1-1?distro=trixie","type":"deb","namespace":"debian","name":"pdns-recursor","version":"4.3.1-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.3.2-1","latest_non_vulnerable_version":"5.4.1-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90807?format=json","vulnerability_id":"VCID-12cd-ky6m-qkdg","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12244","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26013","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26302","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26342","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26383","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26224","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26272","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26278","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26233","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26174","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26178","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26153","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26115","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26055","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2605","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26001","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25891","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25956","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12244"},{"reference_url":"https://security.archlinux.org/ASA-202005-10","reference_id":"ASA-202005-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-10"},{"reference_url":"https://security.archlinux.org/AVG-1163","reference_id":"AVG-1163","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1163"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934679?format=json","purl":"pkg:deb/debian/pdns-recursor@4.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934661?format=json","purl":"pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-2ugc-uygs-hqb8"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-7dc3-qdk8-k7b2"},{"vulnerability":"VCID-8tar-s444-zfac"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-cdzz-8tc8-jucu"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-m445-c6a1-uugf"},{"vulnerability":"VCID-mkcs-362g-t7aq"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-pjbp-1jgm-s3cg"},{"vulnerability":"VCID-umcq-ztbz-qfb2"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-wmgd-z2j3-h7d9"},{"vulnerability":"VCID-wywf-pmyt-zud4"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934659?format=json","purl":"pkg:deb/debian/pdns-recursor@4.8.8-1%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-2ugc-uygs-hqb8"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-cdzz-8tc8-jucu"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-m445-c6a1-uugf"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-pjbp-1jgm-s3cg"},{"vulnerability":"VCID-umcq-ztbz-qfb2"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-wywf-pmyt-zud4"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.8.8-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934663?format=json","purl":"pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934662?format=json","purl":"pkg:deb/debian/pdns-recursor@5.4.0-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076115?format=json","purl":"pkg:deb/debian/pdns-recursor@5.4.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.1-1%3Fdistro=trixie"}],"aliases":["CVE-2020-12244"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-12cd-ky6m-qkdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94319?format=json","vulnerability_id":"VCID-3e3b-z5bh-pban","summary":"An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system's hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have '\\0' termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has '\\0' termination.) Under some conditions, this issue can lead to the writing of one '\\0' byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10030","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0819","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08208","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08178","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08061","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08046","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08204","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08173","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08097","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08062","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08195","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08264","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10030"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934679?format=json","purl":"pkg:deb/debian/pdns-recursor@4.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934661?format=json","purl":"pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-2ugc-uygs-hqb8"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-7dc3-qdk8-k7b2"},{"vulnerability":"VCID-8tar-s444-zfac"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-cdzz-8tc8-jucu"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-m445-c6a1-uugf"},{"vulnerability":"VCID-mkcs-362g-t7aq"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-pjbp-1jgm-s3cg"},{"vulnerability":"VCID-umcq-ztbz-qfb2"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-wmgd-z2j3-h7d9"},{"vulnerability":"VCID-wywf-pmyt-zud4"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934659?format=json","purl":"pkg:deb/debian/pdns-recursor@4.8.8-1%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-2ugc-uygs-hqb8"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-cdzz-8tc8-jucu"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-m445-c6a1-uugf"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-pjbp-1jgm-s3cg"},{"vulnerability":"VCID-umcq-ztbz-qfb2"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-wywf-pmyt-zud4"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.8.8-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934663?format=json","purl":"pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934662?format=json","purl":"pkg:deb/debian/pdns-recursor@5.4.0-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076115?format=json","purl":"pkg:deb/debian/pdns-recursor@5.4.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.1-1%3Fdistro=trixie"}],"aliases":["CVE-2020-10030"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3e3b-z5bh-pban"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90806?format=json","vulnerability_id":"VCID-n2k6-nfxs-7ydj","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10995","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25459","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25789","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25687","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25548","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25493","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25331","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25398","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12244"},{"reference_url":"https://security.archlinux.org/ASA-202005-10","reference_id":"ASA-202005-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-10"},{"reference_url":"https://security.archlinux.org/AVG-1163","reference_id":"AVG-1163","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1163"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934679?format=json","purl":"pkg:deb/debian/pdns-recursor@4.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934661?format=json","purl":"pkg:deb/debian/pdns-recursor@4.4.2-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-2ugc-uygs-hqb8"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-7dc3-qdk8-k7b2"},{"vulnerability":"VCID-8tar-s444-zfac"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-cdzz-8tc8-jucu"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-m445-c6a1-uugf"},{"vulnerability":"VCID-mkcs-362g-t7aq"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-pjbp-1jgm-s3cg"},{"vulnerability":"VCID-umcq-ztbz-qfb2"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-wmgd-z2j3-h7d9"},{"vulnerability":"VCID-wywf-pmyt-zud4"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.4.2-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934659?format=json","purl":"pkg:deb/debian/pdns-recursor@4.8.8-1%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-2ugc-uygs-hqb8"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-cdzz-8tc8-jucu"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-m445-c6a1-uugf"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-pjbp-1jgm-s3cg"},{"vulnerability":"VCID-umcq-ztbz-qfb2"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-wywf-pmyt-zud4"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.8.8-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934663?format=json","purl":"pkg:deb/debian/pdns-recursor@5.2.8-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-chzq-qej6-rkdq"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-pfhu-1qdf-p7d5"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.2.8-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934662?format=json","purl":"pkg:deb/debian/pdns-recursor@5.4.0-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26wf-1bqp-sbff"},{"vulnerability":"VCID-5afe-ws96-nqh9"},{"vulnerability":"VCID-anab-r9ty-1yh1"},{"vulnerability":"VCID-k3re-ss39-zugm"},{"vulnerability":"VCID-mzne-k7ry-pubm"},{"vulnerability":"VCID-v9yz-hcqv-83gu"},{"vulnerability":"VCID-xasd-r2rc-2ufq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076115?format=json","purl":"pkg:deb/debian/pdns-recursor@5.4.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@5.4.1-1%3Fdistro=trixie"}],"aliases":["CVE-2020-10995"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n2k6-nfxs-7ydj"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pdns-recursor@4.3.1-1%3Fdistro=trixie"}