Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/pdns-recursor@5.2.2-r0?arch=armhf&distroversion=v3.22&reponame=community
Typeapk
Namespacealpine
Namepdns-recursor
Version5.2.2-r0
Qualifiers
arch armhf
distroversion v3.22
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.2.5-r0
Latest_non_vulnerable_version5.2.6-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-wywf-pmyt-zud4
vulnerability_id VCID-wywf-pmyt-zud4
summary An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30192
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09742
published_at 2026-04-04T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09691
published_at 2026-04-02T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13399
published_at 2026-04-12T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13327
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.1341
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.1346
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13434
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13352
published_at 2026-04-13T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14977
published_at 2026-04-26T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14919
published_at 2026-04-29T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14876
published_at 2026-04-16T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.14936
published_at 2026-04-21T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.14975
published_at 2026-04-24T12:55:00Z
13
value 0.00049
scoring_system epss
scoring_elements 0.14882
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30192
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30192
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109808
reference_id 1109808
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109808
3
reference_url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html
reference_id powerdns-advisory-2025-04.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-21T13:05:23Z/
url https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html
fixed_packages
0
url pkg:apk/alpine/pdns-recursor@5.2.2-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/pdns-recursor@5.2.2-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns-recursor@5.2.2-r0%3Farch=armhf&distroversion=v3.22&reponame=community
aliases CVE-2025-30192
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wywf-pmyt-zud4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns-recursor@5.2.2-r0%3Farch=armhf&distroversion=v3.22&reponame=community