Recursor
by Powerdns
Standard maintenance is sufficient
Recursor has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
10.7%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 28 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2023-50387 | 7.5 | 52.0% | — |
| CVE-2018-16855 | 7.5 | 19.8% | — |
| CVE-2023-50868 | 7.5 | 11.8% | — |
| CVE-2023-22617 | 7.5 | 1.1% | — |
| CVE-2020-25829 | 7.5 | 0.3% | — |
| CVE-2017-15120 | 7.5 | 0.3% | — |
| CVE-2018-10851 | 5.3 | 0.1% | — |
| CVE-2020-12244 | 7.5 | 0.1% | — |
| CVE-2020-10995 | 7.5 | 0.1% | — |
| CVE-2016-7068 | 5.3 | 0.1% | — |
| CVE-2025-59030 | 7.5 | 0.1% | — |
| CVE-2022-37428 | 6.5 | 0.1% | — |
| CVE-2018-14626 | 5.3 | 0.0% | — |
| CVE-2020-10030 | 8.8 | 0.0% | — |
| CVE-2022-27227 | 7.5 | 0.0% | — |
| CVE-2020-14196 | 5.3 | 0.0% | — |
| CVE-2019-3806 | 8.1 | 0.0% | — |
| CVE-2018-14644 | 5.3 | 0.0% | — |
| CVE-2018-1000003 | 3.7 | 0.0% | — |
| CVE-2025-59029 | 5.3 | 0.0% | — |
7
/ 100
low-risk
Active Threat
7/50 · Minimal
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.