Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/bind@32:9.9.4-29.el7_2?arch=6
Typerpm
Namespaceredhat
Namebind
Version32:9.9.4-29.el7_2
Qualifiers
arch 6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-5jpj-6zqd-3ub9
vulnerability_id VCID-5jpj-6zqd-3ub9
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9147.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9147
reference_id
reference_type
scores
0
value 0.56165
scoring_system epss
scoring_elements 0.98089
published_at 2026-04-01T12:55:00Z
1
value 0.56165
scoring_system epss
scoring_elements 0.98107
published_at 2026-04-13T12:55:00Z
2
value 0.56165
scoring_system epss
scoring_elements 0.98101
published_at 2026-04-09T12:55:00Z
3
value 0.56165
scoring_system epss
scoring_elements 0.98106
published_at 2026-04-12T12:55:00Z
4
value 0.56165
scoring_system epss
scoring_elements 0.98092
published_at 2026-04-02T12:55:00Z
5
value 0.56165
scoring_system epss
scoring_elements 0.98096
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411367
reference_id 1411367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411367
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851063
reference_id 851063
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851063
8
reference_url https://security.archlinux.org/ASA-201701-15
reference_id ASA-201701-15
reference_type
scores
url https://security.archlinux.org/ASA-201701-15
9
reference_url https://security.archlinux.org/AVG-132
reference_id AVG-132
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-132
10
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
11
reference_url https://access.redhat.com/errata/RHSA-2017:0062
reference_id RHSA-2017:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0062
12
reference_url https://access.redhat.com/errata/RHSA-2017:0063
reference_id RHSA-2017:0063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0063
13
reference_url https://access.redhat.com/errata/RHSA-2017:0064
reference_id RHSA-2017:0064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0064
14
reference_url https://access.redhat.com/errata/RHSA-2017:1582
reference_id RHSA-2017:1582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1582
15
reference_url https://access.redhat.com/errata/RHSA-2017:1583
reference_id RHSA-2017:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1583
16
reference_url https://usn.ubuntu.com/3172-1/
reference_id USN-3172-1
reference_type
scores
url https://usn.ubuntu.com/3172-1/
fixed_packages
aliases CVE-2016-9147
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jpj-6zqd-3ub9
1
url VCID-pn63-zx6s-gfgc
vulnerability_id VCID-pn63-zx6s-gfgc
summary
A vulnerability in BIND might allow remote attackers to cause a
    Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8864.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8864.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8864
reference_id
reference_type
scores
0
value 0.45373
scoring_system epss
scoring_elements 0.97582
published_at 2026-04-01T12:55:00Z
1
value 0.45373
scoring_system epss
scoring_elements 0.97606
published_at 2026-04-13T12:55:00Z
2
value 0.45373
scoring_system epss
scoring_elements 0.976
published_at 2026-04-09T12:55:00Z
3
value 0.45373
scoring_system epss
scoring_elements 0.97603
published_at 2026-04-11T12:55:00Z
4
value 0.45373
scoring_system epss
scoring_elements 0.97605
published_at 2026-04-12T12:55:00Z
5
value 0.45373
scoring_system epss
scoring_elements 0.97589
published_at 2026-04-02T12:55:00Z
6
value 0.45373
scoring_system epss
scoring_elements 0.97592
published_at 2026-04-04T12:55:00Z
7
value 0.45373
scoring_system epss
scoring_elements 0.97593
published_at 2026-04-07T12:55:00Z
8
value 0.45373
scoring_system epss
scoring_elements 0.97598
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8864
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1389652
reference_id 1389652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1389652
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842858
reference_id 842858
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842858
6
reference_url https://security.archlinux.org/ASA-201611-3
reference_id ASA-201611-3
reference_type
scores
url https://security.archlinux.org/ASA-201611-3
7
reference_url https://security.archlinux.org/AVG-59
reference_id AVG-59
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-59
8
reference_url https://security.gentoo.org/glsa/201701-26
reference_id GLSA-201701-26
reference_type
scores
url https://security.gentoo.org/glsa/201701-26
9
reference_url https://access.redhat.com/errata/RHSA-2016:2141
reference_id RHSA-2016:2141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2141
10
reference_url https://access.redhat.com/errata/RHSA-2016:2142
reference_id RHSA-2016:2142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2142
11
reference_url https://access.redhat.com/errata/RHSA-2016:2615
reference_id RHSA-2016:2615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2615
12
reference_url https://access.redhat.com/errata/RHSA-2016:2871
reference_id RHSA-2016:2871
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2871
13
reference_url https://access.redhat.com/errata/RHSA-2017:1583
reference_id RHSA-2017:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1583
14
reference_url https://usn.ubuntu.com/3119-1/
reference_id USN-3119-1
reference_type
scores
url https://usn.ubuntu.com/3119-1/
fixed_packages
aliases CVE-2016-8864
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pn63-zx6s-gfgc
2
url VCID-s4q2-n72q-vuhh
vulnerability_id VCID-s4q2-n72q-vuhh
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9444.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9444
reference_id
reference_type
scores
0
value 0.5046
scoring_system epss
scoring_elements 0.97823
published_at 2026-04-01T12:55:00Z
1
value 0.5046
scoring_system epss
scoring_elements 0.97846
published_at 2026-04-13T12:55:00Z
2
value 0.5046
scoring_system epss
scoring_elements 0.97843
published_at 2026-04-11T12:55:00Z
3
value 0.5046
scoring_system epss
scoring_elements 0.97845
published_at 2026-04-12T12:55:00Z
4
value 0.5046
scoring_system epss
scoring_elements 0.97829
published_at 2026-04-02T12:55:00Z
5
value 0.5046
scoring_system epss
scoring_elements 0.9783
published_at 2026-04-04T12:55:00Z
6
value 0.5046
scoring_system epss
scoring_elements 0.97833
published_at 2026-04-07T12:55:00Z
7
value 0.5046
scoring_system epss
scoring_elements 0.97837
published_at 2026-04-08T12:55:00Z
8
value 0.5046
scoring_system epss
scoring_elements 0.9784
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9444
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411377
reference_id 1411377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411377
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851062
reference_id 851062
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851062
8
reference_url https://security.archlinux.org/ASA-201701-15
reference_id ASA-201701-15
reference_type
scores
url https://security.archlinux.org/ASA-201701-15
9
reference_url https://security.archlinux.org/AVG-132
reference_id AVG-132
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-132
10
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
11
reference_url https://access.redhat.com/errata/RHSA-2017:0062
reference_id RHSA-2017:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0062
12
reference_url https://access.redhat.com/errata/RHSA-2017:1583
reference_id RHSA-2017:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1583
13
reference_url https://usn.ubuntu.com/3172-1/
reference_id USN-3172-1
reference_type
scores
url https://usn.ubuntu.com/3172-1/
fixed_packages
aliases CVE-2016-9444
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4q2-n72q-vuhh
3
url VCID-sh9s-2ef5-ruct
vulnerability_id VCID-sh9s-2ef5-ruct
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3137.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3137.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3137
reference_id
reference_type
scores
0
value 0.28496
scoring_system epss
scoring_elements 0.96496
published_at 2026-04-01T12:55:00Z
1
value 0.28496
scoring_system epss
scoring_elements 0.9653
published_at 2026-04-13T12:55:00Z
2
value 0.28496
scoring_system epss
scoring_elements 0.96512
published_at 2026-04-07T12:55:00Z
3
value 0.28496
scoring_system epss
scoring_elements 0.9652
published_at 2026-04-08T12:55:00Z
4
value 0.28496
scoring_system epss
scoring_elements 0.96523
published_at 2026-04-09T12:55:00Z
5
value 0.28496
scoring_system epss
scoring_elements 0.96526
published_at 2026-04-11T12:55:00Z
6
value 0.28496
scoring_system epss
scoring_elements 0.96527
published_at 2026-04-12T12:55:00Z
7
value 0.28496
scoring_system epss
scoring_elements 0.96504
published_at 2026-04-02T12:55:00Z
8
value 0.28496
scoring_system epss
scoring_elements 0.96508
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3137
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://kb.isc.org/docs/aa-01466
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01466
7
reference_url https://security.netapp.com/advisory/ntap-20180802-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180802-0002/
8
reference_url https://www.debian.org/security/2017/dsa-3854
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3854
9
reference_url http://www.securityfocus.com/bid/97651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97651
10
reference_url http://www.securitytracker.com/id/1038258
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038258
11
reference_url http://www.securitytracker.com/id/1040195
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040195
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1441133
reference_id 1441133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1441133
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860225
reference_id 860225
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860225
14
reference_url https://security.archlinux.org/ASA-201704-11
reference_id ASA-201704-11
reference_type
scores
url https://security.archlinux.org/ASA-201704-11
15
reference_url https://security.archlinux.org/AVG-239
reference_id AVG-239
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-239
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.1:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:b1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p6:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:p6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p6:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s8:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:s8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s8:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3137
reference_id CVE-2017-3137
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3137
56
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
57
reference_url https://access.redhat.com/errata/RHSA-2017:1095
reference_id RHSA-2017:1095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1095
58
reference_url https://access.redhat.com/errata/RHSA-2017:1105
reference_id RHSA-2017:1105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1105
59
reference_url https://access.redhat.com/errata/RHSA-2017:1582
reference_id RHSA-2017:1582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1582
60
reference_url https://access.redhat.com/errata/RHSA-2017:1583
reference_id RHSA-2017:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1583
61
reference_url https://usn.ubuntu.com/3259-1/
reference_id USN-3259-1
reference_type
scores
url https://usn.ubuntu.com/3259-1/
fixed_packages
aliases CVE-2017-3137
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sh9s-2ef5-ruct
4
url VCID-uze1-hja3-kubc
vulnerability_id VCID-uze1-hja3-kubc
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9131.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9131
reference_id
reference_type
scores
0
value 0.7283
scoring_system epss
scoring_elements 0.98764
published_at 2026-04-01T12:55:00Z
1
value 0.7283
scoring_system epss
scoring_elements 0.98775
published_at 2026-04-13T12:55:00Z
2
value 0.7283
scoring_system epss
scoring_elements 0.98773
published_at 2026-04-11T12:55:00Z
3
value 0.7283
scoring_system epss
scoring_elements 0.98774
published_at 2026-04-12T12:55:00Z
4
value 0.7283
scoring_system epss
scoring_elements 0.98765
published_at 2026-04-02T12:55:00Z
5
value 0.7283
scoring_system epss
scoring_elements 0.98768
published_at 2026-04-04T12:55:00Z
6
value 0.7283
scoring_system epss
scoring_elements 0.9877
published_at 2026-04-07T12:55:00Z
7
value 0.7283
scoring_system epss
scoring_elements 0.98771
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9131
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411348
reference_id 1411348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411348
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851065
reference_id 851065
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851065
8
reference_url https://security.archlinux.org/ASA-201701-15
reference_id ASA-201701-15
reference_type
scores
url https://security.archlinux.org/ASA-201701-15
9
reference_url https://security.archlinux.org/AVG-132
reference_id AVG-132
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-132
10
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
11
reference_url https://access.redhat.com/errata/RHSA-2017:0062
reference_id RHSA-2017:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0062
12
reference_url https://access.redhat.com/errata/RHSA-2017:1583
reference_id RHSA-2017:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1583
13
reference_url https://usn.ubuntu.com/3172-1/
reference_id USN-3172-1
reference_type
scores
url https://usn.ubuntu.com/3172-1/
fixed_packages
aliases CVE-2016-9131
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uze1-hja3-kubc
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/bind@32:9.9.4-29.el7_2%3Farch=6