Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/pdns-recursor@4.6.1-r0?arch=riscv64&distroversion=edge&reponame=community
Typeapk
Namespacealpine
Namepdns-recursor
Version4.6.1-r0
Qualifiers
arch riscv64
distroversion edge
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.7.2-r0
Latest_non_vulnerable_version5.4.1-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7dc3-qdk8-k7b2
vulnerability_id VCID-7dc3-qdk8-k7b2
summary In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27227
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07439
published_at 2026-04-29T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07522
published_at 2026-04-21T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07482
published_at 2026-04-24T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07471
published_at 2026-04-26T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07406
published_at 2026-04-16T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07449
published_at 2026-04-04T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.0743
published_at 2026-04-07T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-08T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.0751
published_at 2026-04-11T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07496
published_at 2026-04-12T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07484
published_at 2026-04-13T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07393
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27227
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27227
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.archlinux.org/AVG-2655
reference_id AVG-2655
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2655
4
reference_url https://security.archlinux.org/AVG-2656
reference_id AVG-2656
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2656
5
reference_url https://usn.ubuntu.com/7203-1/
reference_id USN-7203-1
reference_type
scores
url https://usn.ubuntu.com/7203-1/
fixed_packages
0
url pkg:apk/alpine/pdns-recursor@4.6.1-r0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/pdns-recursor@4.6.1-r0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns-recursor@4.6.1-r0%3Farch=riscv64&distroversion=edge&reponame=community
aliases CVE-2022-27227
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7dc3-qdk8-k7b2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns-recursor@4.6.1-r0%3Farch=riscv64&distroversion=edge&reponame=community