Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/bind9@0?distro=trixie
Typedeb
Namespacedebian
Namebind9
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version9.7.1.dfsg.P2
Latest_non_vulnerable_version1:9.20.22-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-113v-hjhz-mqa1
vulnerability_id VCID-113v-hjhz-mqa1
summary bind: processing specially crafted responses in quick succession may lead to assertion failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3488.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3488.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3488
reference_id
reference_type
scores
0
value 0.12192
scoring_system epss
scoring_elements 0.93815
published_at 2026-04-04T12:55:00Z
1
value 0.12192
scoring_system epss
scoring_elements 0.93805
published_at 2026-04-02T12:55:00Z
2
value 0.13857
scoring_system epss
scoring_elements 0.94316
published_at 2026-04-21T12:55:00Z
3
value 0.13857
scoring_system epss
scoring_elements 0.94295
published_at 2026-04-12T12:55:00Z
4
value 0.13857
scoring_system epss
scoring_elements 0.94296
published_at 2026-04-13T12:55:00Z
5
value 0.13857
scoring_system epss
scoring_elements 0.94311
published_at 2026-04-16T12:55:00Z
6
value 0.13857
scoring_system epss
scoring_elements 0.94278
published_at 2026-04-07T12:55:00Z
7
value 0.13857
scoring_system epss
scoring_elements 0.94287
published_at 2026-04-08T12:55:00Z
8
value 0.13857
scoring_system epss
scoring_elements 0.94291
published_at 2026-04-09T12:55:00Z
9
value 0.13857
scoring_system epss
scoring_elements 0.94294
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3488
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2164709
reference_id 2164709
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2164709
4
reference_url https://kb.isc.org/docs/cve-2022-3488
reference_id cve-2022-3488
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-01T14:12:10Z/
url https://kb.isc.org/docs/cve-2022-3488
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2022-3488
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-113v-hjhz-mqa1
1
url VCID-1b5w-gp85-qfhw
vulnerability_id VCID-1b5w-gp85-qfhw
summary bind: flaw in nxredirect can cause assertion failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6467.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6467
reference_id
reference_type
scores
0
value 0.17224
scoring_system epss
scoring_elements 0.94989
published_at 2026-04-01T12:55:00Z
1
value 0.17224
scoring_system epss
scoring_elements 0.9504
published_at 2026-04-21T12:55:00Z
2
value 0.17224
scoring_system epss
scoring_elements 0.95024
published_at 2026-04-13T12:55:00Z
3
value 0.17224
scoring_system epss
scoring_elements 0.95033
published_at 2026-04-16T12:55:00Z
4
value 0.17224
scoring_system epss
scoring_elements 0.95037
published_at 2026-04-18T12:55:00Z
5
value 0.17224
scoring_system epss
scoring_elements 0.94998
published_at 2026-04-02T12:55:00Z
6
value 0.17224
scoring_system epss
scoring_elements 0.95
published_at 2026-04-04T12:55:00Z
7
value 0.17224
scoring_system epss
scoring_elements 0.95003
published_at 2026-04-07T12:55:00Z
8
value 0.17224
scoring_system epss
scoring_elements 0.95011
published_at 2026-04-08T12:55:00Z
9
value 0.17224
scoring_system epss
scoring_elements 0.95015
published_at 2026-04-09T12:55:00Z
10
value 0.17224
scoring_system epss
scoring_elements 0.95021
published_at 2026-04-11T12:55:00Z
11
value 0.17224
scoring_system epss
scoring_elements 0.95022
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6467
2
reference_url https://kb.isc.org/docs/cve-2019-6467
reference_id
reference_type
scores
url https://kb.isc.org/docs/cve-2019-6467
3
reference_url https://www.synology.com/security/advisory/Synology_SA_19_20
reference_id
reference_type
scores
url https://www.synology.com/security/advisory/Synology_SA_19_20
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1702545
reference_id 1702545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1702545
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.14.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6467
reference_id CVE-2019-6467
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6467
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2019-6467
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1b5w-gp85-qfhw
2
url VCID-29ng-3xgz-hbh5
vulnerability_id VCID-29ng-3xgz-hbh5
summary bind: Multiple transfers of a zone in quick succession can cause an assertion failure in rbtdb.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5736.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5736
reference_id
reference_type
scores
0
value 0.42906
scoring_system epss
scoring_elements 0.97457
published_at 2026-04-01T12:55:00Z
1
value 0.42906
scoring_system epss
scoring_elements 0.97493
published_at 2026-04-21T12:55:00Z
2
value 0.42906
scoring_system epss
scoring_elements 0.97482
published_at 2026-04-13T12:55:00Z
3
value 0.42906
scoring_system epss
scoring_elements 0.9749
published_at 2026-04-16T12:55:00Z
4
value 0.42906
scoring_system epss
scoring_elements 0.97492
published_at 2026-04-18T12:55:00Z
5
value 0.42906
scoring_system epss
scoring_elements 0.97464
published_at 2026-04-02T12:55:00Z
6
value 0.42906
scoring_system epss
scoring_elements 0.97468
published_at 2026-04-07T12:55:00Z
7
value 0.42906
scoring_system epss
scoring_elements 0.97475
published_at 2026-04-08T12:55:00Z
8
value 0.42906
scoring_system epss
scoring_elements 0.97476
published_at 2026-04-09T12:55:00Z
9
value 0.42906
scoring_system epss
scoring_elements 0.97479
published_at 2026-04-11T12:55:00Z
10
value 0.42906
scoring_system epss
scoring_elements 0.97481
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5736
2
reference_url https://kb.isc.org/docs/aa-01602
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01602
3
reference_url https://security.netapp.com/advisory/ntap-20180926-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0004/
4
reference_url http://www.securityfocus.com/bid/104386
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104386
5
reference_url http://www.securitytracker.com/id/1040941
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040941
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1578591
reference_id 1578591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1578591
7
reference_url https://security.archlinux.org/ASA-201805-20
reference_id ASA-201805-20
reference_type
scores
url https://security.archlinux.org/ASA-201805-20
8
reference_url https://security.archlinux.org/AVG-706
reference_id AVG-706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-706
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5736
reference_id CVE-2018-5736
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5736
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2018-5736
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29ng-3xgz-hbh5
3
url VCID-2fs7-vy7z-mkb5
vulnerability_id VCID-2fs7-vy7z-mkb5
summary bind: bind: Denial of Service via corrupt or malicious record
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13878.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13878
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.13098
published_at 2026-04-04T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.13046
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12901
published_at 2026-04-07T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.1302
published_at 2026-04-21T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13087
published_at 2026-04-08T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13137
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13106
published_at 2026-04-11T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13067
published_at 2026-04-12T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13015
published_at 2026-04-13T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.12918
published_at 2026-04-16T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.12921
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13878
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2431600
reference_id 2431600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2431600
4
reference_url https://downloads.isc.org/isc/bind9/9.18.44
reference_id 9.18.44
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:57:50Z/
url https://downloads.isc.org/isc/bind9/9.18.44
5
reference_url https://downloads.isc.org/isc/bind9/9.20.18
reference_id 9.20.18
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:57:50Z/
url https://downloads.isc.org/isc/bind9/9.20.18
6
reference_url https://downloads.isc.org/isc/bind9/9.21.17
reference_id 9.21.17
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:57:50Z/
url https://downloads.isc.org/isc/bind9/9.21.17
7
reference_url https://kb.isc.org/docs/cve-2025-13878
reference_id cve-2025-13878
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:57:50Z/
url https://kb.isc.org/docs/cve-2025-13878
8
reference_url https://access.redhat.com/errata/RHSA-2026:6935
reference_id RHSA-2026:6935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6935
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.18.44-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.44-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.44-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.18-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
7
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2025-13878
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fs7-vy7z-mkb5
4
url VCID-2r8j-u91u-p7gb
vulnerability_id VCID-2r8j-u91u-p7gb
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which may allow remote Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3868.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3868
reference_id
reference_type
scores
0
value 0.01972
scoring_system epss
scoring_elements 0.8348
published_at 2026-04-01T12:55:00Z
1
value 0.01972
scoring_system epss
scoring_elements 0.83492
published_at 2026-04-02T12:55:00Z
2
value 0.01972
scoring_system epss
scoring_elements 0.83507
published_at 2026-04-04T12:55:00Z
3
value 0.01972
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-07T12:55:00Z
4
value 0.01972
scoring_system epss
scoring_elements 0.83532
published_at 2026-04-08T12:55:00Z
5
value 0.01972
scoring_system epss
scoring_elements 0.83541
published_at 2026-04-09T12:55:00Z
6
value 0.01972
scoring_system epss
scoring_elements 0.83556
published_at 2026-04-11T12:55:00Z
7
value 0.01972
scoring_system epss
scoring_elements 0.8355
published_at 2026-04-12T12:55:00Z
8
value 0.01972
scoring_system epss
scoring_elements 0.83546
published_at 2026-04-13T12:55:00Z
9
value 0.01972
scoring_system epss
scoring_elements 0.8358
published_at 2026-04-16T12:55:00Z
10
value 0.01972
scoring_system epss
scoring_elements 0.83581
published_at 2026-04-18T12:55:00Z
11
value 0.01972
scoring_system epss
scoring_elements 0.83582
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3868
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=842895
reference_id 842895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=842895
3
reference_url https://security.gentoo.org/glsa/201209-04
reference_id GLSA-201209-04
reference_type
scores
url https://security.gentoo.org/glsa/201209-04
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2012-3868
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2r8j-u91u-p7gb
5
url VCID-3q3b-aefg-53db
vulnerability_id VCID-3q3b-aefg-53db
summary bind: assertion failure during EDNS option processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3859.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3859.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3859
reference_id
reference_type
scores
0
value 0.29819
scoring_system epss
scoring_elements 0.96652
published_at 2026-04-21T12:55:00Z
1
value 0.29819
scoring_system epss
scoring_elements 0.96603
published_at 2026-04-01T12:55:00Z
2
value 0.29819
scoring_system epss
scoring_elements 0.96612
published_at 2026-04-02T12:55:00Z
3
value 0.29819
scoring_system epss
scoring_elements 0.96617
published_at 2026-04-04T12:55:00Z
4
value 0.29819
scoring_system epss
scoring_elements 0.96621
published_at 2026-04-07T12:55:00Z
5
value 0.29819
scoring_system epss
scoring_elements 0.96629
published_at 2026-04-08T12:55:00Z
6
value 0.29819
scoring_system epss
scoring_elements 0.96631
published_at 2026-04-09T12:55:00Z
7
value 0.29819
scoring_system epss
scoring_elements 0.96633
published_at 2026-04-11T12:55:00Z
8
value 0.29819
scoring_system epss
scoring_elements 0.96634
published_at 2026-04-12T12:55:00Z
9
value 0.29819
scoring_system epss
scoring_elements 0.96637
published_at 2026-04-13T12:55:00Z
10
value 0.29819
scoring_system epss
scoring_elements 0.96643
published_at 2026-04-16T12:55:00Z
11
value 0.29819
scoring_system epss
scoring_elements 0.96648
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3859
2
reference_url http://secunia.com/advisories/58946
reference_id
reference_type
scores
url http://secunia.com/advisories/58946
3
reference_url https://kb.isc.org/article/AA-01166/
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01166/
4
reference_url https://kb.isc.org/article/AA-01171/
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01171/
5
reference_url http://www.securityfocus.com/bid/68193
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68193
6
reference_url http://www.securitytracker.com/id/1030414
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030414
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1108544
reference_id 1108544
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1108544
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3859
reference_id CVE-2014-3859
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3859
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2014-3859
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3q3b-aefg-53db
6
url VCID-5duc-79fr-9ucf
vulnerability_id VCID-5duc-79fr-9ucf
summary bind: BIND: Denial of Service via authenticated TKEY queries
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3119.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3119.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3119
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01562
published_at 2026-04-21T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.0146
published_at 2026-04-16T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01475
published_at 2026-04-18T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03369
published_at 2026-04-02T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03401
published_at 2026-04-08T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03422
published_at 2026-04-09T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03382
published_at 2026-04-11T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03354
published_at 2026-04-12T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03331
published_at 2026-04-13T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03381
published_at 2026-04-04T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03397
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3119
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451308
reference_id 2451308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2451308
4
reference_url https://downloads.isc.org/isc/bind9/9.20.21
reference_id 9.20.21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:13:41Z/
url https://downloads.isc.org/isc/bind9/9.20.21
5
reference_url https://downloads.isc.org/isc/bind9/9.21.20
reference_id 9.21.20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:13:41Z/
url https://downloads.isc.org/isc/bind9/9.21.20
6
reference_url https://kb.isc.org/docs/cve-2026-3119
reference_id cve-2026-3119
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:13:41Z/
url https://kb.isc.org/docs/cve-2026-3119
7
reference_url https://access.redhat.com/errata/RHSA-2026:6935
reference_id RHSA-2026:6935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6935
8
reference_url https://usn.ubuntu.com/8124-1/
reference_id USN-8124-1
reference_type
scores
url https://usn.ubuntu.com/8124-1/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2026-3119
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5duc-79fr-9ucf
7
url VCID-5pz4-bxq7-27gh
vulnerability_id VCID-5pz4-bxq7-27gh
summary bind: Interaction between NSEC aggresive negative caching and the serve-stale feature can cause a denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5737.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5737
reference_id
reference_type
scores
0
value 0.01186
scoring_system epss
scoring_elements 0.7874
published_at 2026-04-01T12:55:00Z
1
value 0.01186
scoring_system epss
scoring_elements 0.78814
published_at 2026-04-21T12:55:00Z
2
value 0.01186
scoring_system epss
scoring_elements 0.78817
published_at 2026-04-18T12:55:00Z
3
value 0.01186
scoring_system epss
scoring_elements 0.788
published_at 2026-04-12T12:55:00Z
4
value 0.01186
scoring_system epss
scoring_elements 0.78791
published_at 2026-04-13T12:55:00Z
5
value 0.01186
scoring_system epss
scoring_elements 0.7882
published_at 2026-04-16T12:55:00Z
6
value 0.01186
scoring_system epss
scoring_elements 0.78748
published_at 2026-04-02T12:55:00Z
7
value 0.01186
scoring_system epss
scoring_elements 0.78779
published_at 2026-04-04T12:55:00Z
8
value 0.01186
scoring_system epss
scoring_elements 0.78761
published_at 2026-04-07T12:55:00Z
9
value 0.01186
scoring_system epss
scoring_elements 0.78787
published_at 2026-04-08T12:55:00Z
10
value 0.01186
scoring_system epss
scoring_elements 0.78794
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5737
2
reference_url https://kb.isc.org/docs/aa-01606
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01606
3
reference_url https://security.netapp.com/advisory/ntap-20180926-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0004/
4
reference_url http://www.securityfocus.com/bid/104236
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104236
5
reference_url http://www.securitytracker.com/id/1040942
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040942
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1578593
reference_id 1578593
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1578593
7
reference_url https://security.archlinux.org/ASA-201805-20
reference_id ASA-201805-20
reference_type
scores
url https://security.archlinux.org/ASA-201805-20
8
reference_url https://security.archlinux.org/AVG-706
reference_id AVG-706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-706
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5737
reference_id CVE-2018-5737
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5737
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2018-5737
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5pz4-bxq7-27gh
8
url VCID-69p9-m1zr-tfc4
vulnerability_id VCID-69p9-m1zr-tfc4
summary Bind: Unitended availability of cache data.
references
0
reference_url http://ftp.isc.org/isc/bind9/9.7.2-P2/RELEASE-NOTES-BIND-9.7.2-P2.html
reference_id
reference_type
scores
url http://ftp.isc.org/isc/bind9/9.7.2-P2/RELEASE-NOTES-BIND-9.7.2-P2.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0218.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0218.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0218
reference_id
reference_type
scores
0
value 0.02115
scoring_system epss
scoring_elements 0.84149
published_at 2026-04-21T12:55:00Z
1
value 0.02115
scoring_system epss
scoring_elements 0.84053
published_at 2026-04-01T12:55:00Z
2
value 0.02115
scoring_system epss
scoring_elements 0.84066
published_at 2026-04-02T12:55:00Z
3
value 0.02115
scoring_system epss
scoring_elements 0.84083
published_at 2026-04-04T12:55:00Z
4
value 0.02115
scoring_system epss
scoring_elements 0.84085
published_at 2026-04-07T12:55:00Z
5
value 0.02115
scoring_system epss
scoring_elements 0.84108
published_at 2026-04-08T12:55:00Z
6
value 0.02115
scoring_system epss
scoring_elements 0.84114
published_at 2026-04-09T12:55:00Z
7
value 0.02115
scoring_system epss
scoring_elements 0.84132
published_at 2026-04-11T12:55:00Z
8
value 0.02115
scoring_system epss
scoring_elements 0.84126
published_at 2026-04-12T12:55:00Z
9
value 0.02115
scoring_system epss
scoring_elements 0.84122
published_at 2026-04-13T12:55:00Z
10
value 0.02115
scoring_system epss
scoring_elements 0.84144
published_at 2026-04-16T12:55:00Z
11
value 0.02115
scoring_system epss
scoring_elements 0.84146
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0218
3
reference_url https://lists.isc.org/pipermail/bind-announce/2010-September/000655.html
reference_id
reference_type
scores
url https://lists.isc.org/pipermail/bind-announce/2010-September/000655.html
4
reference_url http://www.kb.cert.org/vuls/id/784855
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/784855
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=640696
reference_id 640696
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=640696
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-0218
reference_id CVE-2010-0218
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-0218
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2010-0218
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69p9-m1zr-tfc4
9
url VCID-6wr2-6cwv-fqfb
vulnerability_id VCID-6wr2-6cwv-fqfb
summary bind: an assertion failure may lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4236.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4236.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4236
reference_id
reference_type
scores
0
value 0.00177
scoring_system epss
scoring_elements 0.39232
published_at 2026-04-02T12:55:00Z
1
value 0.00177
scoring_system epss
scoring_elements 0.39255
published_at 2026-04-16T12:55:00Z
2
value 0.00177
scoring_system epss
scoring_elements 0.39175
published_at 2026-04-07T12:55:00Z
3
value 0.00177
scoring_system epss
scoring_elements 0.3923
published_at 2026-04-08T12:55:00Z
4
value 0.00177
scoring_system epss
scoring_elements 0.39246
published_at 2026-04-09T12:55:00Z
5
value 0.00177
scoring_system epss
scoring_elements 0.39258
published_at 2026-04-11T12:55:00Z
6
value 0.00177
scoring_system epss
scoring_elements 0.3922
published_at 2026-04-12T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.39201
published_at 2026-04-13T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39226
published_at 2026-04-18T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.39137
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4236
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052417
reference_id 1052417
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052417
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239661
reference_id 2239661
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2239661
5
reference_url https://usn.ubuntu.com/6390-1/
reference_id USN-6390-1
reference_type
scores
url https://usn.ubuntu.com/6390-1/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.19-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.19-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.19-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.19.17-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.19.17-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.19.17-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
7
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2023-4236
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wr2-6cwv-fqfb
10
url VCID-78pe-7amf-vkgu
vulnerability_id VCID-78pe-7amf-vkgu
summary bind: BIND: Unauthorized access due to use-after-return vulnerability in DNS query handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3591.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3591
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04958
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05098
published_at 2026-04-21T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05034
published_at 2026-04-08T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.0505
published_at 2026-04-09T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05031
published_at 2026-04-11T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05013
published_at 2026-04-12T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.04995
published_at 2026-04-13T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04941
published_at 2026-04-16T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04952
published_at 2026-04-18T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04979
published_at 2026-04-04T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05001
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3591
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451298
reference_id 2451298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2451298
4
reference_url https://downloads.isc.org/isc/bind9/9.20.21
reference_id 9.20.21
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:12:43Z/
url https://downloads.isc.org/isc/bind9/9.20.21
5
reference_url https://downloads.isc.org/isc/bind9/9.21.20
reference_id 9.21.20
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:12:43Z/
url https://downloads.isc.org/isc/bind9/9.21.20
6
reference_url https://kb.isc.org/docs/cve-2026-3591
reference_id cve-2026-3591
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:12:43Z/
url https://kb.isc.org/docs/cve-2026-3591
7
reference_url https://access.redhat.com/errata/RHSA-2026:6935
reference_id RHSA-2026:6935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6935
8
reference_url https://usn.ubuntu.com/8124-1/
reference_id USN-8124-1
reference_type
scores
url https://usn.ubuntu.com/8124-1/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2026-3591
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-78pe-7amf-vkgu
11
url VCID-7be7-f2ha-r7h6
vulnerability_id VCID-7be7-f2ha-r7h6
summary libbind off-by-one buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0122.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0122
reference_id
reference_type
scores
0
value 0.00923
scoring_system epss
scoring_elements 0.75931
published_at 2026-04-01T12:55:00Z
1
value 0.00923
scoring_system epss
scoring_elements 0.75934
published_at 2026-04-02T12:55:00Z
2
value 0.00923
scoring_system epss
scoring_elements 0.75967
published_at 2026-04-04T12:55:00Z
3
value 0.00923
scoring_system epss
scoring_elements 0.75946
published_at 2026-04-07T12:55:00Z
4
value 0.00923
scoring_system epss
scoring_elements 0.75979
published_at 2026-04-08T12:55:00Z
5
value 0.00923
scoring_system epss
scoring_elements 0.75993
published_at 2026-04-09T12:55:00Z
6
value 0.00923
scoring_system epss
scoring_elements 0.76018
published_at 2026-04-11T12:55:00Z
7
value 0.01697
scoring_system epss
scoring_elements 0.82283
published_at 2026-04-12T12:55:00Z
8
value 0.01697
scoring_system epss
scoring_elements 0.82277
published_at 2026-04-13T12:55:00Z
9
value 0.01697
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-18T12:55:00Z
10
value 0.01697
scoring_system epss
scoring_elements 0.82314
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0122
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=429149
reference_id 429149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=429149
4
reference_url https://access.redhat.com/errata/RHSA-2008:0300
reference_id RHSA-2008:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0300
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2008-0122
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7be7-f2ha-r7h6
12
url VCID-7fzd-b48t-9kb4
vulnerability_id VCID-7fzd-b48t-9kb4
summary bind: named can exit with an assertion failure if nxdomain-redirect is used.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6468.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6468.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6468
reference_id
reference_type
scores
0
value 0.01057
scoring_system epss
scoring_elements 0.77546
published_at 2026-04-01T12:55:00Z
1
value 0.01057
scoring_system epss
scoring_elements 0.77635
published_at 2026-04-21T12:55:00Z
2
value 0.01057
scoring_system epss
scoring_elements 0.77605
published_at 2026-04-13T12:55:00Z
3
value 0.01057
scoring_system epss
scoring_elements 0.77643
published_at 2026-04-16T12:55:00Z
4
value 0.01057
scoring_system epss
scoring_elements 0.77641
published_at 2026-04-18T12:55:00Z
5
value 0.01057
scoring_system epss
scoring_elements 0.77552
published_at 2026-04-02T12:55:00Z
6
value 0.01057
scoring_system epss
scoring_elements 0.77579
published_at 2026-04-04T12:55:00Z
7
value 0.01057
scoring_system epss
scoring_elements 0.77559
published_at 2026-04-07T12:55:00Z
8
value 0.01057
scoring_system epss
scoring_elements 0.77589
published_at 2026-04-08T12:55:00Z
9
value 0.01057
scoring_system epss
scoring_elements 0.77596
published_at 2026-04-09T12:55:00Z
10
value 0.01057
scoring_system epss
scoring_elements 0.77623
published_at 2026-04-11T12:55:00Z
11
value 0.01057
scoring_system epss
scoring_elements 0.77607
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6468
2
reference_url https://kb.isc.org/docs/cve-2019-6468
reference_id
reference_type
scores
url https://kb.isc.org/docs/cve-2019-6468
3
reference_url https://www.synology.com/security/advisory/Synology_SA_19_20
reference_id
reference_type
scores
url https://www.synology.com/security/advisory/Synology_SA_19_20
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1702642
reference_id 1702642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1702642
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6468
reference_id CVE-2019-6468
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6468
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2019-6468
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fzd-b48t-9kb4
13
url VCID-7mbz-t9jk-juca
vulnerability_id VCID-7mbz-t9jk-juca
summary bind: A flaw in mirror zone validity checking can allow zone data to be spoofed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6475.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6475.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6475
reference_id
reference_type
scores
0
value 0.00621
scoring_system epss
scoring_elements 0.70006
published_at 2026-04-01T12:55:00Z
1
value 0.00621
scoring_system epss
scoring_elements 0.70101
published_at 2026-04-21T12:55:00Z
2
value 0.00621
scoring_system epss
scoring_elements 0.70096
published_at 2026-04-11T12:55:00Z
3
value 0.00621
scoring_system epss
scoring_elements 0.70082
published_at 2026-04-12T12:55:00Z
4
value 0.00621
scoring_system epss
scoring_elements 0.70069
published_at 2026-04-13T12:55:00Z
5
value 0.00621
scoring_system epss
scoring_elements 0.70112
published_at 2026-04-16T12:55:00Z
6
value 0.00621
scoring_system epss
scoring_elements 0.70121
published_at 2026-04-18T12:55:00Z
7
value 0.00621
scoring_system epss
scoring_elements 0.70018
published_at 2026-04-02T12:55:00Z
8
value 0.00621
scoring_system epss
scoring_elements 0.70033
published_at 2026-04-04T12:55:00Z
9
value 0.00621
scoring_system epss
scoring_elements 0.70009
published_at 2026-04-07T12:55:00Z
10
value 0.00621
scoring_system epss
scoring_elements 0.70057
published_at 2026-04-08T12:55:00Z
11
value 0.00621
scoring_system epss
scoring_elements 0.70073
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6475
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://kb.isc.org/docs/cve-2019-6475
reference_id
reference_type
scores
url https://kb.isc.org/docs/cve-2019-6475
4
reference_url https://security.netapp.com/advisory/ntap-20191024-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191024-0004/
5
reference_url https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1762914
reference_id 1762914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1762914
7
reference_url https://security.archlinux.org/AVG-1056
reference_id AVG-1056
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1056
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6475
reference_id CVE-2019-6475
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-6475
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2019-6475
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7mbz-t9jk-juca
14
url VCID-7n8z-mhbn-xudt
vulnerability_id VCID-7n8z-mhbn-xudt
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9778.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9778
reference_id
reference_type
scores
0
value 0.0542
scoring_system epss
scoring_elements 0.90166
published_at 2026-04-21T12:55:00Z
1
value 0.0542
scoring_system epss
scoring_elements 0.90169
published_at 2026-04-18T12:55:00Z
2
value 0.06614
scoring_system epss
scoring_elements 0.91173
published_at 2026-04-09T12:55:00Z
3
value 0.06614
scoring_system epss
scoring_elements 0.91132
published_at 2026-04-01T12:55:00Z
4
value 0.06614
scoring_system epss
scoring_elements 0.91182
published_at 2026-04-13T12:55:00Z
5
value 0.06614
scoring_system epss
scoring_elements 0.9118
published_at 2026-04-11T12:55:00Z
6
value 0.06614
scoring_system epss
scoring_elements 0.91137
published_at 2026-04-02T12:55:00Z
7
value 0.06614
scoring_system epss
scoring_elements 0.91145
published_at 2026-04-04T12:55:00Z
8
value 0.06614
scoring_system epss
scoring_elements 0.91153
published_at 2026-04-07T12:55:00Z
9
value 0.06614
scoring_system epss
scoring_elements 0.91166
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9778
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://kb.isc.org/article/AA-01442/
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01442/
4
reference_url https://security.netapp.com/advisory/ntap-20180926-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0005/
5
reference_url http://www.securityfocus.com/bid/95388
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95388
6
reference_url http://www.securitytracker.com/id/1037582
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037582
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411387
reference_id 1411387
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411387
8
reference_url https://security.archlinux.org/ASA-201701-15
reference_id ASA-201701-15
reference_type
scores
url https://security.archlinux.org/ASA-201701-15
9
reference_url https://security.archlinux.org/AVG-132
reference_id AVG-132
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-132
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s6:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:s6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s6:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9778
reference_id CVE-2016-9778
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9778
20
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2016-9778
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7n8z-mhbn-xudt
15
url VCID-a88r-72p7-p3bf
vulnerability_id VCID-a88r-72p7-p3bf
summary Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2906.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2906.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2906
reference_id
reference_type
scores
0
value 0.00859
scoring_system epss
scoring_elements 0.7496
published_at 2026-04-02T12:55:00Z
1
value 0.00859
scoring_system epss
scoring_elements 0.75034
published_at 2026-04-21T12:55:00Z
2
value 0.00859
scoring_system epss
scoring_elements 0.74998
published_at 2026-04-08T12:55:00Z
3
value 0.00859
scoring_system epss
scoring_elements 0.7501
published_at 2026-04-09T12:55:00Z
4
value 0.00859
scoring_system epss
scoring_elements 0.75032
published_at 2026-04-11T12:55:00Z
5
value 0.00859
scoring_system epss
scoring_elements 0.75011
published_at 2026-04-12T12:55:00Z
6
value 0.00859
scoring_system epss
scoring_elements 0.75001
published_at 2026-04-13T12:55:00Z
7
value 0.00859
scoring_system epss
scoring_elements 0.75037
published_at 2026-04-16T12:55:00Z
8
value 0.00859
scoring_system epss
scoring_elements 0.75044
published_at 2026-04-18T12:55:00Z
9
value 0.00859
scoring_system epss
scoring_elements 0.74989
published_at 2026-04-04T12:55:00Z
10
value 0.00859
scoring_system epss
scoring_elements 0.74964
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2906
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2128598
reference_id 2128598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2128598
4
reference_url http://www.openwall.com/lists/oss-security/2022/09/21/3
reference_id 3
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:25:54Z/
url http://www.openwall.com/lists/oss-security/2022/09/21/3
5
reference_url https://kb.isc.org/docs/cve-2022-2906
reference_id cve-2022-2906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:25:54Z/
url https://kb.isc.org/docs/cve-2022-2906
6
reference_url https://security.gentoo.org/glsa/202210-25
reference_id GLSA-202210-25
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:25:54Z/
url https://security.gentoo.org/glsa/202210-25
7
reference_url https://usn.ubuntu.com/5626-1/
reference_id USN-5626-1
reference_type
scores
url https://usn.ubuntu.com/5626-1/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.7-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.7-1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2022-2906
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a88r-72p7-p3bf
16
url VCID-a8r3-wrvw-fyhm
vulnerability_id VCID-a8r3-wrvw-fyhm
summary bind: bind9: DNS-over-HTTPS implementation suffers from multiple issues under heavy query load
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12705.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12705.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-12705
reference_id
reference_type
scores
0
value 0.00194
scoring_system epss
scoring_elements 0.41367
published_at 2026-04-08T12:55:00Z
1
value 0.00194
scoring_system epss
scoring_elements 0.41395
published_at 2026-04-11T12:55:00Z
2
value 0.00194
scoring_system epss
scoring_elements 0.41364
published_at 2026-04-18T12:55:00Z
3
value 0.00194
scoring_system epss
scoring_elements 0.4135
published_at 2026-04-13T12:55:00Z
4
value 0.00194
scoring_system epss
scoring_elements 0.41393
published_at 2026-04-16T12:55:00Z
5
value 0.00194
scoring_system epss
scoring_elements 0.4136
published_at 2026-04-02T12:55:00Z
6
value 0.00194
scoring_system epss
scoring_elements 0.4139
published_at 2026-04-04T12:55:00Z
7
value 0.00194
scoring_system epss
scoring_elements 0.41317
published_at 2026-04-07T12:55:00Z
8
value 0.00194
scoring_system epss
scoring_elements 0.41375
published_at 2026-04-09T12:55:00Z
9
value 0.07239
scoring_system epss
scoring_elements 0.9164
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-12705
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094735
reference_id 1094735
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094735
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2342880
reference_id 2342880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2342880
5
reference_url https://kb.isc.org/docs/cve-2024-12705
reference_id cve-2024-12705
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T15:25:35Z/
url https://kb.isc.org/docs/cve-2024-12705
6
reference_url https://access.redhat.com/errata/RHSA-2025:1670
reference_id RHSA-2025:1670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1670
7
reference_url https://access.redhat.com/errata/RHSA-2025:1907
reference_id RHSA-2025:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1907
8
reference_url https://usn.ubuntu.com/7241-1/
reference_id USN-7241-1
reference_type
scores
url https://usn.ubuntu.com/7241-1/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.33-1~deb12u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.33-1~deb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.33-1~deb12u2%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.5-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.5-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
7
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2024-12705
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a8r3-wrvw-fyhm
17
url VCID-acny-gm8c-pyam
vulnerability_id VCID-acny-gm8c-pyam
summary bind: Crash from assertion error when debug log level is 10 and log entries meet buffer boundary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5742.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5742.json
1
reference_url https://access.redhat.com/security/cve/cve-2018-5742
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2018-5742
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5742
reference_id
reference_type
scores
0
value 0.01301
scoring_system epss
scoring_elements 0.7968
published_at 2026-04-01T12:55:00Z
1
value 0.01301
scoring_system epss
scoring_elements 0.79762
published_at 2026-04-21T12:55:00Z
2
value 0.01301
scoring_system epss
scoring_elements 0.79751
published_at 2026-04-11T12:55:00Z
3
value 0.01301
scoring_system epss
scoring_elements 0.79735
published_at 2026-04-12T12:55:00Z
4
value 0.01301
scoring_system epss
scoring_elements 0.79757
published_at 2026-04-16T12:55:00Z
5
value 0.01301
scoring_system epss
scoring_elements 0.79758
published_at 2026-04-18T12:55:00Z
6
value 0.01301
scoring_system epss
scoring_elements 0.79687
published_at 2026-04-02T12:55:00Z
7
value 0.01301
scoring_system epss
scoring_elements 0.79708
published_at 2026-04-04T12:55:00Z
8
value 0.01301
scoring_system epss
scoring_elements 0.79694
published_at 2026-04-07T12:55:00Z
9
value 0.01301
scoring_system epss
scoring_elements 0.79722
published_at 2026-04-08T12:55:00Z
10
value 0.01301
scoring_system epss
scoring_elements 0.79729
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5742
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1655844
reference_id 1655844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1655844
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5742
reference_id CVE-2018-5742
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5742
8
reference_url https://access.redhat.com/errata/RHSA-2019:0194
reference_id RHSA-2019:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0194
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2018-5742
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-acny-gm8c-pyam
18
url VCID-b3u2-wjzm-duhc
vulnerability_id VCID-b3u2-wjzm-duhc
summary bind: When chasing DS records, a timed-out or artificially delayed fetch could cause 'named' to crash while resuming a DS lookup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0667.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0667
reference_id
reference_type
scores
0
value 0.00694
scoring_system epss
scoring_elements 0.71825
published_at 2026-04-01T12:55:00Z
1
value 0.00694
scoring_system epss
scoring_elements 0.71896
published_at 2026-04-21T12:55:00Z
2
value 0.00694
scoring_system epss
scoring_elements 0.71908
published_at 2026-04-16T12:55:00Z
3
value 0.00694
scoring_system epss
scoring_elements 0.71913
published_at 2026-04-18T12:55:00Z
4
value 0.00694
scoring_system epss
scoring_elements 0.71834
published_at 2026-04-02T12:55:00Z
5
value 0.00694
scoring_system epss
scoring_elements 0.71853
published_at 2026-04-04T12:55:00Z
6
value 0.00694
scoring_system epss
scoring_elements 0.71827
published_at 2026-04-07T12:55:00Z
7
value 0.00694
scoring_system epss
scoring_elements 0.71865
published_at 2026-04-08T12:55:00Z
8
value 0.00694
scoring_system epss
scoring_elements 0.71877
published_at 2026-04-09T12:55:00Z
9
value 0.00694
scoring_system epss
scoring_elements 0.71901
published_at 2026-04-11T12:55:00Z
10
value 0.00694
scoring_system epss
scoring_elements 0.71883
published_at 2026-04-12T12:55:00Z
11
value 0.00694
scoring_system epss
scoring_elements 0.71866
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0667
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064515
reference_id 2064515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064515
4
reference_url https://security.archlinux.org/ASA-202204-5
reference_id ASA-202204-5
reference_type
scores
url https://security.archlinux.org/ASA-202204-5
5
reference_url https://security.archlinux.org/AVG-2661
reference_id AVG-2661
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2661
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.1-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.1-1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2022-0667
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3u2-wjzm-duhc
19
url VCID-b47j-67kw-4bgv
vulnerability_id VCID-b47j-67kw-4bgv
summary Unspecified vulnerability in ISC BIND 9.3.5-P2-W1, 9.4.2-P2-W1, and 9.5.0-P2-W1 on Windows allows remote attackers to cause a denial of service (UDP client handler termination) via unknown vectors.
references
0
reference_url http://marc.info/?l=bind-announce&m=122180244228376&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bind-announce&m=122180244228376&w=2
1
reference_url http://marc.info/?l=bind-announce&m=122180244228378&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bind-announce&m=122180244228378&w=2
2
reference_url http://marc.info/?l=bind-announce&m=122180376630150&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bind-announce&m=122180376630150&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4163.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4163.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4163
reference_id
reference_type
scores
0
value 0.26697
scoring_system epss
scoring_elements 0.96356
published_at 2026-04-21T12:55:00Z
1
value 0.26697
scoring_system epss
scoring_elements 0.96303
published_at 2026-04-01T12:55:00Z
2
value 0.26697
scoring_system epss
scoring_elements 0.96311
published_at 2026-04-02T12:55:00Z
3
value 0.26697
scoring_system epss
scoring_elements 0.96318
published_at 2026-04-04T12:55:00Z
4
value 0.26697
scoring_system epss
scoring_elements 0.96323
published_at 2026-04-07T12:55:00Z
5
value 0.26697
scoring_system epss
scoring_elements 0.96331
published_at 2026-04-08T12:55:00Z
6
value 0.26697
scoring_system epss
scoring_elements 0.96335
published_at 2026-04-09T12:55:00Z
7
value 0.26697
scoring_system epss
scoring_elements 0.96339
published_at 2026-04-11T12:55:00Z
8
value 0.26697
scoring_system epss
scoring_elements 0.96338
published_at 2026-04-12T12:55:00Z
9
value 0.26697
scoring_system epss
scoring_elements 0.96341
published_at 2026-04-13T12:55:00Z
10
value 0.26697
scoring_system epss
scoring_elements 0.9635
published_at 2026-04-16T12:55:00Z
11
value 0.26697
scoring_system epss
scoring_elements 0.96354
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4163
5
reference_url http://secunia.com/advisories/31924
reference_id
reference_type
scores
url http://secunia.com/advisories/31924
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45234
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45234
7
reference_url http://www.securityfocus.com/bid/31252
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31252
8
reference_url http://www.securitytracker.com/id?1020901
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020901
9
reference_url http://www.vupen.com/english/advisories/2008/2637
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2637
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.5:p2_w1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.5:p2_w1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.5:p2_w1:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:p2_w1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.2:p2_w1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:p2_w1:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:p2_w1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.0:p2_w1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:p2_w1:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4163
reference_id CVE-2008-4163
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4163
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2008-4163
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b47j-67kw-4bgv
20
url VCID-cufc-v1hn-jbdn
vulnerability_id VCID-cufc-v1hn-jbdn
summary bind: An error in QNAME minimization code can cause BIND to exit with an assertion failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6476.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6476
reference_id
reference_type
scores
0
value 0.01269
scoring_system epss
scoring_elements 0.79427
published_at 2026-04-01T12:55:00Z
1
value 0.01269
scoring_system epss
scoring_elements 0.79509
published_at 2026-04-21T12:55:00Z
2
value 0.01269
scoring_system epss
scoring_elements 0.79503
published_at 2026-04-11T12:55:00Z
3
value 0.01269
scoring_system epss
scoring_elements 0.79486
published_at 2026-04-12T12:55:00Z
4
value 0.01269
scoring_system epss
scoring_elements 0.79476
published_at 2026-04-13T12:55:00Z
5
value 0.01269
scoring_system epss
scoring_elements 0.79507
published_at 2026-04-16T12:55:00Z
6
value 0.01269
scoring_system epss
scoring_elements 0.79504
published_at 2026-04-18T12:55:00Z
7
value 0.01269
scoring_system epss
scoring_elements 0.79434
published_at 2026-04-02T12:55:00Z
8
value 0.01269
scoring_system epss
scoring_elements 0.79458
published_at 2026-04-04T12:55:00Z
9
value 0.01269
scoring_system epss
scoring_elements 0.79445
published_at 2026-04-07T12:55:00Z
10
value 0.01269
scoring_system epss
scoring_elements 0.79473
published_at 2026-04-08T12:55:00Z
11
value 0.01269
scoring_system epss
scoring_elements 0.79481
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6476
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://kb.isc.org/docs/cve-2019-6476
reference_id
reference_type
scores
url https://kb.isc.org/docs/cve-2019-6476
4
reference_url https://security.netapp.com/advisory/ntap-20191024-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191024-0004/
5
reference_url https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1762957
reference_id 1762957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1762957
7
reference_url https://security.archlinux.org/AVG-1056
reference_id AVG-1056
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1056
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6476
reference_id CVE-2019-6476
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6476
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2019-6476
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cufc-v1hn-jbdn
21
url VCID-d76w-pkgv-1kdj
vulnerability_id VCID-d76w-pkgv-1kdj
summary Unknown vulnerability in BIND 9.2.0 in HP-UX B.11.00, B.11.11, and B.11.23 allows remote attackers to cause a denial of service.
references
0
reference_url http://marc.info/?l=bugtraq&m=110805105200470&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110805105200470&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0364
reference_id
reference_type
scores
0
value 0.00826
scoring_system epss
scoring_elements 0.74508
published_at 2026-04-21T12:55:00Z
1
value 0.00826
scoring_system epss
scoring_elements 0.74423
published_at 2026-04-01T12:55:00Z
2
value 0.00826
scoring_system epss
scoring_elements 0.74427
published_at 2026-04-02T12:55:00Z
3
value 0.00826
scoring_system epss
scoring_elements 0.74453
published_at 2026-04-04T12:55:00Z
4
value 0.00826
scoring_system epss
scoring_elements 0.74428
published_at 2026-04-07T12:55:00Z
5
value 0.00826
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-08T12:55:00Z
6
value 0.00826
scoring_system epss
scoring_elements 0.74477
published_at 2026-04-09T12:55:00Z
7
value 0.00826
scoring_system epss
scoring_elements 0.74499
published_at 2026-04-11T12:55:00Z
8
value 0.00826
scoring_system epss
scoring_elements 0.7448
published_at 2026-04-12T12:55:00Z
9
value 0.00826
scoring_system epss
scoring_elements 0.74471
published_at 2026-04-13T12:55:00Z
10
value 0.00826
scoring_system epss
scoring_elements 0.74509
published_at 2026-04-16T12:55:00Z
11
value 0.00826
scoring_system epss
scoring_elements 0.74517
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0364
2
reference_url http://secunia.com/advisories/14220/
reference_id
reference_type
scores
url http://secunia.com/advisories/14220/
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19276
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19276
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5690
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5690
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0364
reference_id CVE-2005-0364
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0364
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2005-0364
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d76w-pkgv-1kdj
22
url VCID-d9kh-wcwu-mbdg
vulnerability_id VCID-d9kh-wcwu-mbdg
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which could cause a Denial of Service condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2088.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2088.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2088
reference_id
reference_type
scores
0
value 0.48434
scoring_system epss
scoring_elements 0.97754
published_at 2026-04-21T12:55:00Z
1
value 0.48434
scoring_system epss
scoring_elements 0.97751
published_at 2026-04-16T12:55:00Z
2
value 0.48434
scoring_system epss
scoring_elements 0.97723
published_at 2026-04-01T12:55:00Z
3
value 0.48434
scoring_system epss
scoring_elements 0.97729
published_at 2026-04-02T12:55:00Z
4
value 0.48434
scoring_system epss
scoring_elements 0.97731
published_at 2026-04-07T12:55:00Z
5
value 0.48434
scoring_system epss
scoring_elements 0.97736
published_at 2026-04-08T12:55:00Z
6
value 0.48434
scoring_system epss
scoring_elements 0.9774
published_at 2026-04-09T12:55:00Z
7
value 0.48434
scoring_system epss
scoring_elements 0.97742
published_at 2026-04-11T12:55:00Z
8
value 0.48434
scoring_system epss
scoring_elements 0.97744
published_at 2026-04-12T12:55:00Z
9
value 0.48434
scoring_system epss
scoring_elements 0.97745
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2088
5
reference_url https://kb.isc.org/article/AA-01351
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01351
6
reference_url https://kb.isc.org/article/AA-01380
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01380
7
reference_url http://www.securityfocus.com/bid/84290
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84290
8
reference_url http://www.securitytracker.com/id/1035238
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035238
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1315690
reference_id 1315690
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1315690
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2088
reference_id CVE-2016-2088
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2088
40
reference_url https://security.gentoo.org/glsa/201610-07
reference_id GLSA-201610-07
reference_type
scores
url https://security.gentoo.org/glsa/201610-07
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2016-2088
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d9kh-wcwu-mbdg
23
url VCID-gr3d-pzrc-uydb
vulnerability_id VCID-gr3d-pzrc-uydb
summary rdataset.c in ISC BIND 9 Supported Preview Edition 9.9.8-S before 9.9.8-S5, when nxdomain-redirect is enabled, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via crafted flag values in a query.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1284
reference_id
reference_type
scores
0
value 0.09482
scoring_system epss
scoring_elements 0.9284
published_at 2026-04-21T12:55:00Z
1
value 0.09482
scoring_system epss
scoring_elements 0.92836
published_at 2026-04-18T12:55:00Z
2
value 0.09482
scoring_system epss
scoring_elements 0.92798
published_at 2026-04-01T12:55:00Z
3
value 0.09482
scoring_system epss
scoring_elements 0.92804
published_at 2026-04-02T12:55:00Z
4
value 0.09482
scoring_system epss
scoring_elements 0.92809
published_at 2026-04-04T12:55:00Z
5
value 0.09482
scoring_system epss
scoring_elements 0.92807
published_at 2026-04-07T12:55:00Z
6
value 0.09482
scoring_system epss
scoring_elements 0.92817
published_at 2026-04-08T12:55:00Z
7
value 0.09482
scoring_system epss
scoring_elements 0.92821
published_at 2026-04-09T12:55:00Z
8
value 0.09482
scoring_system epss
scoring_elements 0.92825
published_at 2026-04-13T12:55:00Z
9
value 0.09482
scoring_system epss
scoring_elements 0.92824
published_at 2026-04-12T12:55:00Z
10
value 0.09482
scoring_system epss
scoring_elements 0.92835
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1284
1
reference_url https://kb.isc.org/article/AA-01348
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01348
2
reference_url https://kb.isc.org/article/AA-01438
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01438
3
reference_url http://www.securitytracker.com/id/1034935
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034935
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s4:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1284
reference_id CVE-2016-1284
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1284
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2016-1284
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gr3d-pzrc-uydb
24
url VCID-h36g-3jnc-qqaq
vulnerability_id VCID-h36g-3jnc-qqaq
summary
Multiple vulnerabilities have been found in BIND, possibly
    resulting in Denial of Service.
references
0
reference_url http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3919.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3919.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-3919
reference_id
reference_type
scores
0
value 0.09658
scoring_system epss
scoring_elements 0.92886
published_at 2026-04-07T12:55:00Z
1
value 0.09658
scoring_system epss
scoring_elements 0.92877
published_at 2026-04-01T12:55:00Z
2
value 0.09658
scoring_system epss
scoring_elements 0.92885
published_at 2026-04-02T12:55:00Z
3
value 0.09658
scoring_system epss
scoring_elements 0.92888
published_at 2026-04-04T12:55:00Z
4
value 0.10288
scoring_system epss
scoring_elements 0.93168
published_at 2026-04-12T12:55:00Z
5
value 0.10288
scoring_system epss
scoring_elements 0.93169
published_at 2026-04-13T12:55:00Z
6
value 0.10288
scoring_system epss
scoring_elements 0.93186
published_at 2026-04-16T12:55:00Z
7
value 0.10288
scoring_system epss
scoring_elements 0.9319
published_at 2026-04-18T12:55:00Z
8
value 0.10288
scoring_system epss
scoring_elements 0.93199
published_at 2026-04-21T12:55:00Z
9
value 0.10288
scoring_system epss
scoring_elements 0.9316
published_at 2026-04-08T12:55:00Z
10
value 0.10288
scoring_system epss
scoring_elements 0.93165
published_at 2026-04-09T12:55:00Z
11
value 0.10288
scoring_system epss
scoring_elements 0.9317
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-3919
3
reference_url https://kb.isc.org/article/AA-00967/
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-00967/
4
reference_url https://support.apple.com/kb/HT6536
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6536
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=970905
reference_id 970905
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=970905
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-3919
reference_id CVE-2013-3919
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-3919
10
reference_url https://security.gentoo.org/glsa/201401-34
reference_id GLSA-201401-34
reference_type
scores
url https://security.gentoo.org/glsa/201401-34
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2013-3919
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h36g-3jnc-qqaq
25
url VCID-k1pn-qp6q-x3ew
vulnerability_id VCID-k1pn-qp6q-x3ew
summary BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-2211
reference_id
reference_type
scores
0
value 0.03336
scoring_system epss
scoring_elements 0.87241
published_at 2026-04-01T12:55:00Z
1
value 0.03336
scoring_system epss
scoring_elements 0.8725
published_at 2026-04-02T12:55:00Z
2
value 0.03336
scoring_system epss
scoring_elements 0.87266
published_at 2026-04-04T12:55:00Z
3
value 0.03336
scoring_system epss
scoring_elements 0.87263
published_at 2026-04-07T12:55:00Z
4
value 0.03336
scoring_system epss
scoring_elements 0.87283
published_at 2026-04-08T12:55:00Z
5
value 0.03336
scoring_system epss
scoring_elements 0.87291
published_at 2026-04-09T12:55:00Z
6
value 0.03336
scoring_system epss
scoring_elements 0.87304
published_at 2026-04-11T12:55:00Z
7
value 0.03336
scoring_system epss
scoring_elements 0.87298
published_at 2026-04-12T12:55:00Z
8
value 0.03336
scoring_system epss
scoring_elements 0.87294
published_at 2026-04-13T12:55:00Z
9
value 0.03336
scoring_system epss
scoring_elements 0.87308
published_at 2026-04-16T12:55:00Z
10
value 0.03336
scoring_system epss
scoring_elements 0.87313
published_at 2026-04-18T12:55:00Z
11
value 0.03336
scoring_system epss
scoring_elements 0.87307
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-2211
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2002-2211
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k1pn-qp6q-x3ew
26
url VCID-k4qv-8ggs-afef
vulnerability_id VCID-k4qv-8ggs-afef
summary bind: assertion failure in DNSSEC validation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3139.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3139.json
1
reference_url https://access.redhat.com/security/cve/cve-2017-3139
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2017-3139
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3139
reference_id
reference_type
scores
0
value 0.00723
scoring_system epss
scoring_elements 0.7249
published_at 2026-04-07T12:55:00Z
1
value 0.00723
scoring_system epss
scoring_elements 0.7259
published_at 2026-04-18T12:55:00Z
2
value 0.00723
scoring_system epss
scoring_elements 0.72548
published_at 2026-04-12T12:55:00Z
3
value 0.00723
scoring_system epss
scoring_elements 0.72538
published_at 2026-04-13T12:55:00Z
4
value 0.00723
scoring_system epss
scoring_elements 0.7258
published_at 2026-04-21T12:55:00Z
5
value 0.00723
scoring_system epss
scoring_elements 0.72497
published_at 2026-04-02T12:55:00Z
6
value 0.00723
scoring_system epss
scoring_elements 0.72514
published_at 2026-04-04T12:55:00Z
7
value 0.00723
scoring_system epss
scoring_elements 0.72529
published_at 2026-04-08T12:55:00Z
8
value 0.00723
scoring_system epss
scoring_elements 0.72541
published_at 2026-04-09T12:55:00Z
9
value 0.00723
scoring_system epss
scoring_elements 0.72565
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3139
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1447743
reference_id 1447743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1447743
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3139
reference_id CVE-2017-3139
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3139
13
reference_url https://access.redhat.com/errata/RHSA-2017:1202
reference_id RHSA-2017:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1202
14
reference_url https://access.redhat.com/errata/RHSA-2017:1582
reference_id RHSA-2017:1582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1582
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2017-3139
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4qv-8ggs-afef
27
url VCID-kbgt-7v61-1yg7
vulnerability_id VCID-kbgt-7v61-1yg7
summary BIND 8.x through 8.3.3 allows remote attackers to cause a denial of service (crash) via SIG RR elements with invalid expiry times, which are removed from the internal BIND database and later cause a null dereference.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1221
reference_id
reference_type
scores
0
value 0.04297
scoring_system epss
scoring_elements 0.88816
published_at 2026-04-01T12:55:00Z
1
value 0.04297
scoring_system epss
scoring_elements 0.88825
published_at 2026-04-02T12:55:00Z
2
value 0.04297
scoring_system epss
scoring_elements 0.88841
published_at 2026-04-04T12:55:00Z
3
value 0.04297
scoring_system epss
scoring_elements 0.88843
published_at 2026-04-07T12:55:00Z
4
value 0.04297
scoring_system epss
scoring_elements 0.8886
published_at 2026-04-08T12:55:00Z
5
value 0.04297
scoring_system epss
scoring_elements 0.88866
published_at 2026-04-09T12:55:00Z
6
value 0.04297
scoring_system epss
scoring_elements 0.88877
published_at 2026-04-11T12:55:00Z
7
value 0.04297
scoring_system epss
scoring_elements 0.88872
published_at 2026-04-13T12:55:00Z
8
value 0.04297
scoring_system epss
scoring_elements 0.88885
published_at 2026-04-16T12:55:00Z
9
value 0.04297
scoring_system epss
scoring_elements 0.88883
published_at 2026-04-18T12:55:00Z
10
value 0.04297
scoring_system epss
scoring_elements 0.8888
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1221
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2002-1221
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbgt-7v61-1yg7
28
url VCID-mfgj-p39v-3kgg
vulnerability_id VCID-mfgj-p39v-3kgg
summary
A vulnerability in BIND could lead to a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5986.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5986.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5986
reference_id
reference_type
scores
0
value 0.47991
scoring_system epss
scoring_elements 0.97699
published_at 2026-04-01T12:55:00Z
1
value 0.47991
scoring_system epss
scoring_elements 0.97705
published_at 2026-04-02T12:55:00Z
2
value 0.47991
scoring_system epss
scoring_elements 0.97707
published_at 2026-04-04T12:55:00Z
3
value 0.47991
scoring_system epss
scoring_elements 0.97706
published_at 2026-04-07T12:55:00Z
4
value 0.47991
scoring_system epss
scoring_elements 0.97711
published_at 2026-04-08T12:55:00Z
5
value 0.47991
scoring_system epss
scoring_elements 0.97714
published_at 2026-04-09T12:55:00Z
6
value 0.47991
scoring_system epss
scoring_elements 0.97717
published_at 2026-04-11T12:55:00Z
7
value 0.47991
scoring_system epss
scoring_elements 0.97719
published_at 2026-04-12T12:55:00Z
8
value 0.47991
scoring_system epss
scoring_elements 0.9772
published_at 2026-04-13T12:55:00Z
9
value 0.47991
scoring_system epss
scoring_elements 0.97725
published_at 2026-04-16T12:55:00Z
10
value 0.47991
scoring_system epss
scoring_elements 0.97728
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5986
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1259085
reference_id 1259085
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1259085
3
reference_url https://security.gentoo.org/glsa/201510-01
reference_id GLSA-201510-01
reference_type
scores
url https://security.gentoo.org/glsa/201510-01
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2015-5986
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfgj-p39v-3kgg
29
url VCID-mm57-1mhd-vue9
vulnerability_id VCID-mm57-1mhd-vue9
summary
Incomplete verification of RSA and DSA certificates might lead to spoofed
    records authenticated using DNSSEC.
references
0
reference_url http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33
reference_id
reference_type
scores
url http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0265.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0265.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0265
reference_id
reference_type
scores
0
value 0.0039
scoring_system epss
scoring_elements 0.60107
published_at 2026-04-18T12:55:00Z
1
value 0.0039
scoring_system epss
scoring_elements 0.601
published_at 2026-04-16T12:55:00Z
2
value 0.0039
scoring_system epss
scoring_elements 0.59935
published_at 2026-04-01T12:55:00Z
3
value 0.0039
scoring_system epss
scoring_elements 0.60013
published_at 2026-04-02T12:55:00Z
4
value 0.0039
scoring_system epss
scoring_elements 0.60037
published_at 2026-04-04T12:55:00Z
5
value 0.0039
scoring_system epss
scoring_elements 0.60008
published_at 2026-04-07T12:55:00Z
6
value 0.0039
scoring_system epss
scoring_elements 0.60058
published_at 2026-04-08T12:55:00Z
7
value 0.0039
scoring_system epss
scoring_elements 0.60072
published_at 2026-04-09T12:55:00Z
8
value 0.0039
scoring_system epss
scoring_elements 0.60093
published_at 2026-04-21T12:55:00Z
9
value 0.0039
scoring_system epss
scoring_elements 0.60078
published_at 2026-04-12T12:55:00Z
10
value 0.0039
scoring_system epss
scoring_elements 0.60061
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0265
3
reference_url http://secunia.com/advisories/33559
reference_id
reference_type
scores
url http://secunia.com/advisories/33559
4
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362
5
reference_url https://www.isc.org/node/373
reference_id
reference_type
scores
url https://www.isc.org/node/373
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:037
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:037
7
reference_url http://www.vupen.com/english/advisories/2009/0043
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0043
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0265
reference_id CVE-2009-0265
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2009-0265
10
reference_url https://security.gentoo.org/glsa/200903-14
reference_id GLSA-200903-14
reference_type
scores
url https://security.gentoo.org/glsa/200903-14
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2009-0265
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mm57-1mhd-vue9
30
url VCID-n1bd-y84g-77ae
vulnerability_id VCID-n1bd-y84g-77ae
summary bind: race condition when handling socket errors can lead to an assertion failure in resolver.c
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174145.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174145.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174252.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174252.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8461.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8461.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8461
reference_id
reference_type
scores
0
value 0.08096
scoring_system epss
scoring_elements 0.92162
published_at 2026-04-21T12:55:00Z
1
value 0.08096
scoring_system epss
scoring_elements 0.9212
published_at 2026-04-01T12:55:00Z
2
value 0.08096
scoring_system epss
scoring_elements 0.92127
published_at 2026-04-02T12:55:00Z
3
value 0.08096
scoring_system epss
scoring_elements 0.92134
published_at 2026-04-04T12:55:00Z
4
value 0.08096
scoring_system epss
scoring_elements 0.92138
published_at 2026-04-07T12:55:00Z
5
value 0.08096
scoring_system epss
scoring_elements 0.9215
published_at 2026-04-08T12:55:00Z
6
value 0.08096
scoring_system epss
scoring_elements 0.92153
published_at 2026-04-13T12:55:00Z
7
value 0.08096
scoring_system epss
scoring_elements 0.92157
published_at 2026-04-11T12:55:00Z
8
value 0.08096
scoring_system epss
scoring_elements 0.92158
published_at 2026-04-12T12:55:00Z
9
value 0.08096
scoring_system epss
scoring_elements 0.92164
published_at 2026-04-16T12:55:00Z
10
value 0.08096
scoring_system epss
scoring_elements 0.92161
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8461
4
reference_url https://kb.isc.org/article/AA-01319
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01319
5
reference_url https://kb.isc.org/article/AA-01380
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01380
6
reference_url https://kb.isc.org/article/AA-01438
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01438
7
reference_url http://www.securityfocus.com/bid/79347
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79347
8
reference_url http://www.securitytracker.com/id/1034419
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034419
9
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291186
reference_id 1291186
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291186
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:8.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8.4.7:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.7:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:p1:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.7:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:rc1:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.7:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:rc2:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:rc1:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8461
reference_id CVE-2015-8461
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-8461
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2015-8461
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n1bd-y84g-77ae
31
url VCID-nw9j-ggq9-uqaq
vulnerability_id VCID-nw9j-ggq9-uqaq
summary bind: DNS message with invalid TSIG causes an assertion failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40775.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-40775
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33915
published_at 2026-04-04T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33769
published_at 2026-04-07T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33884
published_at 2026-04-02T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39787
published_at 2026-04-21T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39862
published_at 2026-04-12T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.39845
published_at 2026-04-13T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39895
published_at 2026-04-16T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.39866
published_at 2026-04-18T12:55:00Z
8
value 0.00181
scoring_system epss
scoring_elements 0.39873
published_at 2026-04-08T12:55:00Z
9
value 0.00181
scoring_system epss
scoring_elements 0.39887
published_at 2026-04-09T12:55:00Z
10
value 0.00181
scoring_system epss
scoring_elements 0.39896
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-40775
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367442
reference_id 2367442
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2367442
4
reference_url https://security.archlinux.org/ASA-202505-14
reference_id ASA-202505-14
reference_type
scores
url https://security.archlinux.org/ASA-202505-14
5
reference_url https://security.archlinux.org/AVG-2881
reference_id AVG-2881
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2881
6
reference_url https://kb.isc.org/docs/cve-2025-40775
reference_id cve-2025-40775
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-21T13:19:58Z/
url https://kb.isc.org/docs/cve-2025-40775
7
reference_url https://usn.ubuntu.com/7526-1/
reference_id USN-7526-1
reference_type
scores
url https://usn.ubuntu.com/7526-1/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.9-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.9-1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2025-40775
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw9j-ggq9-uqaq
32
url VCID-pgxv-tnvp-pkb7
vulnerability_id VCID-pgxv-tnvp-pkb7
summary bind: an error in the EDNS Client Subnet (ECS) feature for recursive resolvers can cause BIND to exit with an assertion failure leading to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6469.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6469.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6469
reference_id
reference_type
scores
0
value 0.01057
scoring_system epss
scoring_elements 0.77546
published_at 2026-04-01T12:55:00Z
1
value 0.01057
scoring_system epss
scoring_elements 0.77635
published_at 2026-04-21T12:55:00Z
2
value 0.01057
scoring_system epss
scoring_elements 0.77605
published_at 2026-04-13T12:55:00Z
3
value 0.01057
scoring_system epss
scoring_elements 0.77643
published_at 2026-04-16T12:55:00Z
4
value 0.01057
scoring_system epss
scoring_elements 0.77641
published_at 2026-04-18T12:55:00Z
5
value 0.01057
scoring_system epss
scoring_elements 0.77552
published_at 2026-04-02T12:55:00Z
6
value 0.01057
scoring_system epss
scoring_elements 0.77579
published_at 2026-04-04T12:55:00Z
7
value 0.01057
scoring_system epss
scoring_elements 0.77559
published_at 2026-04-07T12:55:00Z
8
value 0.01057
scoring_system epss
scoring_elements 0.77589
published_at 2026-04-08T12:55:00Z
9
value 0.01057
scoring_system epss
scoring_elements 0.77596
published_at 2026-04-09T12:55:00Z
10
value 0.01057
scoring_system epss
scoring_elements 0.77623
published_at 2026-04-11T12:55:00Z
11
value 0.01057
scoring_system epss
scoring_elements 0.77607
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6469
2
reference_url https://kb.isc.org/docs/cve-2019-6469
reference_id
reference_type
scores
url https://kb.isc.org/docs/cve-2019-6469
3
reference_url https://support.f5.com/csp/article/K39751401?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K39751401?utm_source=f5support&amp%3Butm_medium=RSS
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1715352
reference_id 1715352
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1715352
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6469
reference_id CVE-2019-6469
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6469
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2019-6469
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pgxv-tnvp-pkb7
33
url VCID-pxq6-e945-wqen
vulnerability_id VCID-pxq6-e945-wqen
summary bind9: Cleaning an ECS-enabled cache may cause excessive CPU load
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5680.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5680.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5680
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28647
published_at 2026-04-02T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28458
published_at 2026-04-21T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28603
published_at 2026-04-11T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28559
published_at 2026-04-12T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28509
published_at 2026-04-13T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28531
published_at 2026-04-16T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28506
published_at 2026-04-18T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28691
published_at 2026-04-04T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28496
published_at 2026-04-07T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.2856
published_at 2026-04-08T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.286
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5680
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2264285
reference_id 2264285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2264285
4
reference_url https://kb.isc.org/docs/cve-2023-5680
reference_id cve-2023-5680
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T18:02:52Z/
url https://kb.isc.org/docs/cve-2023-5680
5
reference_url https://security.netapp.com/advisory/ntap-20240503-0005/
reference_id ntap-20240503-0005
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T18:02:52Z/
url https://security.netapp.com/advisory/ntap-20240503-0005/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2023-5680
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pxq6-e945-wqen
34
url VCID-pywd-4rnk-dfhw
vulnerability_id VCID-pywd-4rnk-dfhw
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which could cause a Denial of Service condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176564.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176564.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175977.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175977.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8705.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8705.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8705
reference_id
reference_type
scores
0
value 0.29069
scoring_system epss
scoring_elements 0.96595
published_at 2026-04-21T12:55:00Z
1
value 0.29069
scoring_system epss
scoring_elements 0.96591
published_at 2026-04-18T12:55:00Z
2
value 0.29069
scoring_system epss
scoring_elements 0.96546
published_at 2026-04-01T12:55:00Z
3
value 0.29069
scoring_system epss
scoring_elements 0.96555
published_at 2026-04-02T12:55:00Z
4
value 0.29069
scoring_system epss
scoring_elements 0.9656
published_at 2026-04-04T12:55:00Z
5
value 0.29069
scoring_system epss
scoring_elements 0.96563
published_at 2026-04-07T12:55:00Z
6
value 0.29069
scoring_system epss
scoring_elements 0.96571
published_at 2026-04-08T12:55:00Z
7
value 0.29069
scoring_system epss
scoring_elements 0.96574
published_at 2026-04-09T12:55:00Z
8
value 0.29069
scoring_system epss
scoring_elements 0.96576
published_at 2026-04-11T12:55:00Z
9
value 0.29069
scoring_system epss
scoring_elements 0.96577
published_at 2026-04-12T12:55:00Z
10
value 0.29069
scoring_system epss
scoring_elements 0.96579
published_at 2026-04-13T12:55:00Z
11
value 0.29069
scoring_system epss
scoring_elements 0.96586
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8705
4
reference_url https://kb.isc.org/article/AA-01336
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01336
5
reference_url https://kb.isc.org/article/AA-01380
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01380
6
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
7
reference_url http://www.securityfocus.com/bid/81314
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81314
8
reference_url http://www.securitytracker.com/id/1034740
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034740
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1299367
reference_id 1299367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1299367
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:p2:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8705
reference_id CVE-2015-8705
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:C
1
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8705
70
reference_url https://security.gentoo.org/glsa/201610-07
reference_id GLSA-201610-07
reference_type
scores
url https://security.gentoo.org/glsa/201610-07
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2015-8705
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pywd-4rnk-dfhw
35
url VCID-qgwq-kcp2-jqep
vulnerability_id VCID-qgwq-kcp2-jqep
summary bind: bind9: A flood of DNS messages over TCP may make the server unstable
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0760.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0760
reference_id
reference_type
scores
0
value 0.15622
scoring_system epss
scoring_elements 0.94715
published_at 2026-04-21T12:55:00Z
1
value 0.1669
scoring_system epss
scoring_elements 0.94933
published_at 2026-04-12T12:55:00Z
2
value 0.1669
scoring_system epss
scoring_elements 0.94926
published_at 2026-04-09T12:55:00Z
3
value 0.1669
scoring_system epss
scoring_elements 0.94931
published_at 2026-04-11T12:55:00Z
4
value 0.1669
scoring_system epss
scoring_elements 0.94935
published_at 2026-04-13T12:55:00Z
5
value 0.1669
scoring_system epss
scoring_elements 0.94947
published_at 2026-04-18T12:55:00Z
6
value 0.1669
scoring_system epss
scoring_elements 0.94943
published_at 2026-04-16T12:55:00Z
7
value 0.1669
scoring_system epss
scoring_elements 0.9491
published_at 2026-04-02T12:55:00Z
8
value 0.1669
scoring_system epss
scoring_elements 0.94912
published_at 2026-04-04T12:55:00Z
9
value 0.1669
scoring_system epss
scoring_elements 0.94914
published_at 2026-04-07T12:55:00Z
10
value 0.1669
scoring_system epss
scoring_elements 0.94923
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0760
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2024/07/23/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T16:02:34Z/
url http://www.openwall.com/lists/oss-security/2024/07/23/1
4
reference_url http://www.openwall.com/lists/oss-security/2024/07/31/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T16:02:34Z/
url http://www.openwall.com/lists/oss-security/2024/07/31/2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2298878
reference_id 2298878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2298878
6
reference_url https://kb.isc.org/docs/cve-2024-0760
reference_id cve-2024-0760
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T16:02:34Z/
url https://kb.isc.org/docs/cve-2024-0760
7
reference_url https://usn.ubuntu.com/6909-1/
reference_id USN-6909-1
reference_type
scores
url https://usn.ubuntu.com/6909-1/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.28-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.28-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.28-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.0-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.0-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
7
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2024-0760
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qgwq-kcp2-jqep
36
url VCID-qhg8-95mf-aufj
vulnerability_id VCID-qhg8-95mf-aufj
summary bind: Destroying a TLS session early causes assertion failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1183.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1183
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60098
published_at 2026-04-01T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60175
published_at 2026-04-02T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60201
published_at 2026-04-04T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.6017
published_at 2026-04-07T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.60219
published_at 2026-04-08T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.60234
published_at 2026-04-09T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60255
published_at 2026-04-11T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60241
published_at 2026-04-12T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.60224
published_at 2026-04-13T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.60263
published_at 2026-04-16T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60271
published_at 2026-04-18T12:55:00Z
11
value 0.00392
scoring_system epss
scoring_elements 0.60258
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1183
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2087575
reference_id 2087575
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2087575
3
reference_url https://security.archlinux.org/AVG-2727
reference_id AVG-2727
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2727
4
reference_url https://usn.ubuntu.com/5429-1/
reference_id USN-5429-1
reference_type
scores
url https://usn.ubuntu.com/5429-1/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.3-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.3-1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2022-1183
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhg8-95mf-aufj
37
url VCID-qnzx-zj6k-tkhf
vulnerability_id VCID-qnzx-zj6k-tkhf
summary bind: /etc/rndc.key has 644 permissions by default
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6283.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6283
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32345
published_at 2026-04-01T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32496
published_at 2026-04-02T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32531
published_at 2026-04-04T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32353
published_at 2026-04-21T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32402
published_at 2026-04-08T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.3243
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32433
published_at 2026-04-11T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32395
published_at 2026-04-12T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32368
published_at 2026-04-13T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32404
published_at 2026-04-16T12:55:00Z
10
value 0.00129
scoring_system epss
scoring_elements 0.32381
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6283
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=419421
reference_id 419421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=419421
3
reference_url https://access.redhat.com/errata/RHSA-2008:0300
reference_id RHSA-2008:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0300
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2007-6283
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qnzx-zj6k-tkhf
38
url VCID-qu4k-agb9-rqc7
vulnerability_id VCID-qu4k-agb9-rqc7
summary
Multiple vulnerabilities have been found in BIND, allowing remote
    attackers to cause a
    denial of service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8680.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8680.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8680
reference_id
reference_type
scores
0
value 0.02261
scoring_system epss
scoring_elements 0.84642
published_at 2026-04-21T12:55:00Z
1
value 0.02261
scoring_system epss
scoring_elements 0.84541
published_at 2026-04-01T12:55:00Z
2
value 0.02261
scoring_system epss
scoring_elements 0.84557
published_at 2026-04-02T12:55:00Z
3
value 0.02261
scoring_system epss
scoring_elements 0.84579
published_at 2026-04-04T12:55:00Z
4
value 0.02261
scoring_system epss
scoring_elements 0.84583
published_at 2026-04-07T12:55:00Z
5
value 0.02261
scoring_system epss
scoring_elements 0.84604
published_at 2026-04-08T12:55:00Z
6
value 0.02261
scoring_system epss
scoring_elements 0.8461
published_at 2026-04-09T12:55:00Z
7
value 0.02261
scoring_system epss
scoring_elements 0.84629
published_at 2026-04-11T12:55:00Z
8
value 0.02261
scoring_system epss
scoring_elements 0.84625
published_at 2026-04-12T12:55:00Z
9
value 0.02261
scoring_system epss
scoring_elements 0.8462
published_at 2026-04-13T12:55:00Z
10
value 0.02261
scoring_system epss
scoring_elements 0.8464
published_at 2026-04-16T12:55:00Z
11
value 0.02261
scoring_system epss
scoring_elements 0.84641
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8680
2
reference_url http://security.gentoo.org/glsa/glsa-201502-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-03.xml
3
reference_url https://kb.isc.org/article/AA-01217
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01217
4
reference_url https://security.netapp.com/advisory/ntap-20190730-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190730-0002/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1171919
reference_id 1171919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1171919
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8680
reference_id CVE-2014-8680
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-8680
9
reference_url https://security.gentoo.org/glsa/201502-03
reference_id GLSA-201502-03
reference_type
scores
url https://security.gentoo.org/glsa/201502-03
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2014-8680
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qu4k-agb9-rqc7
39
url VCID-rgjg-zw6c-77ad
vulnerability_id VCID-rgjg-zw6c-77ad
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0029.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0029.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0029
reference_id
reference_type
scores
0
value 0.21847
scoring_system epss
scoring_elements 0.95722
published_at 2026-04-01T12:55:00Z
1
value 0.21847
scoring_system epss
scoring_elements 0.95732
published_at 2026-04-02T12:55:00Z
2
value 0.21847
scoring_system epss
scoring_elements 0.95739
published_at 2026-04-04T12:55:00Z
3
value 0.21847
scoring_system epss
scoring_elements 0.95742
published_at 2026-04-07T12:55:00Z
4
value 0.21847
scoring_system epss
scoring_elements 0.95751
published_at 2026-04-08T12:55:00Z
5
value 0.21847
scoring_system epss
scoring_elements 0.95754
published_at 2026-04-09T12:55:00Z
6
value 0.21847
scoring_system epss
scoring_elements 0.95757
published_at 2026-04-12T12:55:00Z
7
value 0.21847
scoring_system epss
scoring_elements 0.95758
published_at 2026-04-13T12:55:00Z
8
value 0.21847
scoring_system epss
scoring_elements 0.95768
published_at 2026-04-16T12:55:00Z
9
value 0.21847
scoring_system epss
scoring_elements 0.95771
published_at 2026-04-18T12:55:00Z
10
value 0.21847
scoring_system epss
scoring_elements 0.95773
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0029
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616723
reference_id 1616723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616723
3
reference_url https://access.redhat.com/errata/RHSA-2004:383
reference_id RHSA-2004:383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:383
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2002-0029
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgjg-zw6c-77ad
40
url VCID-rvqb-pvb9-w7ht
vulnerability_id VCID-rvqb-pvb9-w7ht
summary bind: BIND: Denial of Service via specially crafted domain query causing a memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3104.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3104.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3104
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13235
published_at 2026-04-21T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13148
published_at 2026-04-18T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18601
published_at 2026-04-02T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18656
published_at 2026-04-04T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18365
published_at 2026-04-07T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18447
published_at 2026-04-08T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18499
published_at 2026-04-09T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.185
published_at 2026-04-11T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18452
published_at 2026-04-12T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18401
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3104
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451310
reference_id 2451310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2451310
4
reference_url https://downloads.isc.org/isc/bind9/9.20.21
reference_id 9.20.21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:56:20Z/
url https://downloads.isc.org/isc/bind9/9.20.21
5
reference_url https://downloads.isc.org/isc/bind9/9.21.20
reference_id 9.21.20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:56:20Z/
url https://downloads.isc.org/isc/bind9/9.21.20
6
reference_url https://kb.isc.org/docs/cve-2026-3104
reference_id cve-2026-3104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:56:20Z/
url https://kb.isc.org/docs/cve-2026-3104
7
reference_url https://access.redhat.com/errata/RHSA-2026:6935
reference_id RHSA-2026:6935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6935
8
reference_url https://usn.ubuntu.com/8124-1/
reference_id USN-8124-1
reference_type
scores
url https://usn.ubuntu.com/8124-1/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2026-3104
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rvqb-pvb9-w7ht
41
url VCID-stfg-weu9-3kag
vulnerability_id VCID-stfg-weu9-3kag
summary
A `named` caching resolver that is configured to send ECS (EDNS Client Subnet) options may be vulnerable to a cache-poisoning attack.
This issue affects BIND 9 versions 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.37-S1, and 9.20.9-S1 through 9.20.10-S1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-40776
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02275
published_at 2026-04-07T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02273
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02299
published_at 2026-04-09T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02277
published_at 2026-04-08T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02278
published_at 2026-04-04T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03052
published_at 2026-04-21T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02946
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02921
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02932
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02978
published_at 2026-04-11T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.02954
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-40776
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://kb.isc.org/docs/cve-2025-40776
reference_id cve-2025-40776
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-22T14:54:56Z/
url https://kb.isc.org/docs/cve-2025-40776
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2025-40776
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stfg-weu9-3kag
42
url VCID-sy8n-7mhn-1be7
vulnerability_id VCID-sy8n-7mhn-1be7
summary BIND 8.3.x through 8.3.3 allows remote attackers to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1220
reference_id
reference_type
scores
0
value 0.32686
scoring_system epss
scoring_elements 0.96841
published_at 2026-04-01T12:55:00Z
1
value 0.32686
scoring_system epss
scoring_elements 0.96849
published_at 2026-04-02T12:55:00Z
2
value 0.32686
scoring_system epss
scoring_elements 0.96851
published_at 2026-04-04T12:55:00Z
3
value 0.32686
scoring_system epss
scoring_elements 0.96856
published_at 2026-04-07T12:55:00Z
4
value 0.32686
scoring_system epss
scoring_elements 0.96865
published_at 2026-04-08T12:55:00Z
5
value 0.32686
scoring_system epss
scoring_elements 0.96866
published_at 2026-04-09T12:55:00Z
6
value 0.32686
scoring_system epss
scoring_elements 0.96869
published_at 2026-04-11T12:55:00Z
7
value 0.32686
scoring_system epss
scoring_elements 0.9687
published_at 2026-04-12T12:55:00Z
8
value 0.32686
scoring_system epss
scoring_elements 0.96871
published_at 2026-04-13T12:55:00Z
9
value 0.32686
scoring_system epss
scoring_elements 0.96878
published_at 2026-04-16T12:55:00Z
10
value 0.32686
scoring_system epss
scoring_elements 0.96882
published_at 2026-04-18T12:55:00Z
11
value 0.32686
scoring_system epss
scoring_elements 0.96885
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1220
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/22011.c
reference_id CVE-2002-1220;OSVDB-9724
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/22011.c
2
reference_url https://www.securityfocus.com/bid/6161/info
reference_id CVE-2002-1220;OSVDB-9724
reference_type exploit
scores
url https://www.securityfocus.com/bid/6161/info
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2002-1220
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sy8n-7mhn-1be7
43
url VCID-t4dn-73sn-57c1
vulnerability_id VCID-t4dn-73sn-57c1
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3140.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3140
reference_id
reference_type
scores
0
value 0.19519
scoring_system epss
scoring_elements 0.95366
published_at 2026-04-01T12:55:00Z
1
value 0.19519
scoring_system epss
scoring_elements 0.95418
published_at 2026-04-21T12:55:00Z
2
value 0.19519
scoring_system epss
scoring_elements 0.95393
published_at 2026-04-08T12:55:00Z
3
value 0.19519
scoring_system epss
scoring_elements 0.95395
published_at 2026-04-09T12:55:00Z
4
value 0.19519
scoring_system epss
scoring_elements 0.95401
published_at 2026-04-12T12:55:00Z
5
value 0.19519
scoring_system epss
scoring_elements 0.95403
published_at 2026-04-13T12:55:00Z
6
value 0.19519
scoring_system epss
scoring_elements 0.95411
published_at 2026-04-16T12:55:00Z
7
value 0.19519
scoring_system epss
scoring_elements 0.95415
published_at 2026-04-18T12:55:00Z
8
value 0.19519
scoring_system epss
scoring_elements 0.95375
published_at 2026-04-02T12:55:00Z
9
value 0.19519
scoring_system epss
scoring_elements 0.95382
published_at 2026-04-04T12:55:00Z
10
value 0.19519
scoring_system epss
scoring_elements 0.95386
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3140
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
4
reference_url https://kb.isc.org/docs/aa-01495
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01495
5
reference_url https://security.netapp.com/advisory/ntap-20180926-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0001/
6
reference_url http://www.securityfocus.com/bid/99088
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99088
7
reference_url http://www.securitytracker.com/id/1038692
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038692
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461302
reference_id 1461302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461302
9
reference_url https://security.archlinux.org/ASA-201706-18
reference_id ASA-201706-18
reference_type
scores
url https://security.archlinux.org/ASA-201706-18
10
reference_url https://security.archlinux.org/AVG-301
reference_id AVG-301
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-301
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:s1:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3140
reference_id CVE-2017-3140
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3140
20
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2017-3140
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4dn-73sn-57c1
44
url VCID-tf4h-qdz8-fuau
vulnerability_id VCID-tf4h-qdz8-fuau
summary bind: localnets ACL bypass caused by WinSock API bug
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6230.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6230.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6230
reference_id
reference_type
scores
0
value 0.01057
scoring_system epss
scoring_elements 0.77549
published_at 2026-04-01T12:55:00Z
1
value 0.01057
scoring_system epss
scoring_elements 0.77555
published_at 2026-04-02T12:55:00Z
2
value 0.01057
scoring_system epss
scoring_elements 0.77582
published_at 2026-04-04T12:55:00Z
3
value 0.01057
scoring_system epss
scoring_elements 0.77562
published_at 2026-04-07T12:55:00Z
4
value 0.01057
scoring_system epss
scoring_elements 0.77592
published_at 2026-04-08T12:55:00Z
5
value 0.01057
scoring_system epss
scoring_elements 0.77599
published_at 2026-04-09T12:55:00Z
6
value 0.01057
scoring_system epss
scoring_elements 0.77626
published_at 2026-04-11T12:55:00Z
7
value 0.01057
scoring_system epss
scoring_elements 0.7761
published_at 2026-04-12T12:55:00Z
8
value 0.01057
scoring_system epss
scoring_elements 0.77609
published_at 2026-04-13T12:55:00Z
9
value 0.01057
scoring_system epss
scoring_elements 0.77646
published_at 2026-04-16T12:55:00Z
10
value 0.01057
scoring_system epss
scoring_elements 0.77644
published_at 2026-04-18T12:55:00Z
11
value 0.01057
scoring_system epss
scoring_elements 0.77639
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6230
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1027689
reference_id 1027689
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1027689
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2013-6230
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tf4h-qdz8-fuau
45
url VCID-ubru-w77c-87dv
vulnerability_id VCID-ubru-w77c-87dv
summary Buffer overflow in named in BIND 4 versions 4.9.10 and earlier, and 8 versions 8.3.3 and earlier, allows remote attackers to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1219
reference_id
reference_type
scores
0
value 0.10367
scoring_system epss
scoring_elements 0.93174
published_at 2026-04-01T12:55:00Z
1
value 0.10367
scoring_system epss
scoring_elements 0.93184
published_at 2026-04-02T12:55:00Z
2
value 0.10367
scoring_system epss
scoring_elements 0.93188
published_at 2026-04-04T12:55:00Z
3
value 0.10367
scoring_system epss
scoring_elements 0.93186
published_at 2026-04-07T12:55:00Z
4
value 0.10367
scoring_system epss
scoring_elements 0.93195
published_at 2026-04-08T12:55:00Z
5
value 0.10367
scoring_system epss
scoring_elements 0.93199
published_at 2026-04-09T12:55:00Z
6
value 0.10367
scoring_system epss
scoring_elements 0.93203
published_at 2026-04-11T12:55:00Z
7
value 0.10367
scoring_system epss
scoring_elements 0.93201
published_at 2026-04-12T12:55:00Z
8
value 0.10367
scoring_system epss
scoring_elements 0.93202
published_at 2026-04-13T12:55:00Z
9
value 0.10367
scoring_system epss
scoring_elements 0.93218
published_at 2026-04-16T12:55:00Z
10
value 0.10367
scoring_system epss
scoring_elements 0.93223
published_at 2026-04-18T12:55:00Z
11
value 0.10367
scoring_system epss
scoring_elements 0.93231
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1219
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2002-1219
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ubru-w77c-87dv
46
url VCID-v3z3-e53d-mbcu
vulnerability_id VCID-v3z3-e53d-mbcu
summary
Multiple vulnerabilities have been found in BIND, allowing remote
    attackers to cause a
    denial of service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3214.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3214
reference_id
reference_type
scores
0
value 0.11256
scoring_system epss
scoring_elements 0.9348
published_at 2026-04-01T12:55:00Z
1
value 0.11256
scoring_system epss
scoring_elements 0.93489
published_at 2026-04-02T12:55:00Z
2
value 0.11256
scoring_system epss
scoring_elements 0.93496
published_at 2026-04-07T12:55:00Z
3
value 0.11256
scoring_system epss
scoring_elements 0.93504
published_at 2026-04-08T12:55:00Z
4
value 0.11256
scoring_system epss
scoring_elements 0.93507
published_at 2026-04-09T12:55:00Z
5
value 0.11256
scoring_system epss
scoring_elements 0.93512
published_at 2026-04-13T12:55:00Z
6
value 0.11256
scoring_system epss
scoring_elements 0.93511
published_at 2026-04-12T12:55:00Z
7
value 0.11256
scoring_system epss
scoring_elements 0.93531
published_at 2026-04-16T12:55:00Z
8
value 0.11256
scoring_system epss
scoring_elements 0.93537
published_at 2026-04-18T12:55:00Z
9
value 0.11256
scoring_system epss
scoring_elements 0.93544
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3214
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1096016
reference_id 1096016
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1096016
3
reference_url https://security.gentoo.org/glsa/201502-03
reference_id GLSA-201502-03
reference_type
scores
url https://security.gentoo.org/glsa/201502-03
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2014-3214
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v3z3-e53d-mbcu
47
url VCID-w7hs-jqc1-qqa9
vulnerability_id VCID-w7hs-jqc1-qqa9
summary bind: A malformed request can trigger an assertion failure in badcache.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5734.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5734
reference_id
reference_type
scores
0
value 0.05241
scoring_system epss
scoring_elements 0.89984
published_at 2026-04-21T12:55:00Z
1
value 0.05241
scoring_system epss
scoring_elements 0.89987
published_at 2026-04-16T12:55:00Z
2
value 0.05241
scoring_system epss
scoring_elements 0.89988
published_at 2026-04-18T12:55:00Z
3
value 0.06399
scoring_system epss
scoring_elements 0.90985
published_at 2026-04-02T12:55:00Z
4
value 0.06399
scoring_system epss
scoring_elements 0.90994
published_at 2026-04-04T12:55:00Z
5
value 0.06399
scoring_system epss
scoring_elements 0.91004
published_at 2026-04-07T12:55:00Z
6
value 0.06399
scoring_system epss
scoring_elements 0.91017
published_at 2026-04-08T12:55:00Z
7
value 0.06399
scoring_system epss
scoring_elements 0.91022
published_at 2026-04-09T12:55:00Z
8
value 0.06399
scoring_system epss
scoring_elements 0.91031
published_at 2026-04-12T12:55:00Z
9
value 0.06399
scoring_system epss
scoring_elements 0.9103
published_at 2026-04-13T12:55:00Z
10
value 0.06399
scoring_system epss
scoring_elements 0.9098
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5734
2
reference_url https://kb.isc.org/docs/aa-01562
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01562
3
reference_url https://security.netapp.com/advisory/ntap-20180926-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0005/
4
reference_url http://www.securityfocus.com/bid/103189
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/103189
5
reference_url http://www.securitytracker.com/id/1040438
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040438
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1550602
reference_id 1550602
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1550602
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:s4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s4:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.6:s2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s2:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5734
reference_id CVE-2018-5734
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5734
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2018-5734
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w7hs-jqc1-qqa9
48
url VCID-wcf1-sy8g-27dw
vulnerability_id VCID-wcf1-sy8g-27dw
summary bind: DNSSEC-Validated cache can be remotely terminated with malformed NSEC record
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2829.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2829
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.22076
published_at 2026-04-02T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21902
published_at 2026-04-07T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22127
published_at 2026-04-04T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21983
published_at 2026-04-08T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22038
published_at 2026-04-09T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22052
published_at 2026-04-11T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22011
published_at 2026-04-12T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21952
published_at 2026-04-16T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.25417
published_at 2026-04-18T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25385
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2829
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2216581
reference_id 2216581
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2216581
4
reference_url https://kb.isc.org/docs/cve-2023-2829
reference_id cve-2023-2829
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:34:26Z/
url https://kb.isc.org/docs/cve-2023-2829
5
reference_url https://security.netapp.com/advisory/ntap-20230703-0010/
reference_id ntap-20230703-0010
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:34:26Z/
url https://security.netapp.com/advisory/ntap-20230703-0010/
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2023-2829
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcf1-sy8g-27dw
49
url VCID-wpmu-g3xw-u7cs
vulnerability_id VCID-wpmu-g3xw-u7cs
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3141.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3141
reference_id
reference_type
scores
0
value 0.03103
scoring_system epss
scoring_elements 0.86747
published_at 2026-04-01T12:55:00Z
1
value 0.03103
scoring_system epss
scoring_elements 0.86827
published_at 2026-04-21T12:55:00Z
2
value 0.03103
scoring_system epss
scoring_elements 0.86808
published_at 2026-04-13T12:55:00Z
3
value 0.03103
scoring_system epss
scoring_elements 0.86824
published_at 2026-04-16T12:55:00Z
4
value 0.03103
scoring_system epss
scoring_elements 0.86828
published_at 2026-04-18T12:55:00Z
5
value 0.03103
scoring_system epss
scoring_elements 0.86758
published_at 2026-04-02T12:55:00Z
6
value 0.03103
scoring_system epss
scoring_elements 0.86777
published_at 2026-04-04T12:55:00Z
7
value 0.03103
scoring_system epss
scoring_elements 0.86775
published_at 2026-04-07T12:55:00Z
8
value 0.03103
scoring_system epss
scoring_elements 0.86794
published_at 2026-04-08T12:55:00Z
9
value 0.03103
scoring_system epss
scoring_elements 0.86803
published_at 2026-04-09T12:55:00Z
10
value 0.03103
scoring_system epss
scoring_elements 0.86816
published_at 2026-04-11T12:55:00Z
11
value 0.03103
scoring_system epss
scoring_elements 0.86813
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3141
2
reference_url https://kb.isc.org/docs/aa-01496
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01496
3
reference_url https://security.netapp.com/advisory/ntap-20180926-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0001/
4
reference_url https://www.exploit-db.com/exploits/42121/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/42121/
5
reference_url http://www.securityfocus.com/bid/99089
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99089
6
reference_url http://www.securitytracker.com/id/1038693
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038693
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461310
reference_id 1461310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461310
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.6:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:p2:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.2:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:p1:*:*:*:*:*:*
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42121.txt
reference_id CVE-2017-3141
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42121.txt
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3141
reference_id CVE-2017-3141
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
2
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3141
13
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2017-3141
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpmu-g3xw-u7cs
50
url VCID-x4bu-4ex7-37cd
vulnerability_id VCID-x4bu-4ex7-37cd
summary bind: Lookups involving a DNAME could trigger an assertion failure when 'synth-from-dnssec' was enabled (which is the default)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0635.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0635
reference_id
reference_type
scores
0
value 0.00781
scoring_system epss
scoring_elements 0.73649
published_at 2026-04-01T12:55:00Z
1
value 0.00781
scoring_system epss
scoring_elements 0.73748
published_at 2026-04-18T12:55:00Z
2
value 0.00781
scoring_system epss
scoring_elements 0.73697
published_at 2026-04-13T12:55:00Z
3
value 0.00781
scoring_system epss
scoring_elements 0.7374
published_at 2026-04-21T12:55:00Z
4
value 0.00781
scoring_system epss
scoring_elements 0.73658
published_at 2026-04-02T12:55:00Z
5
value 0.00781
scoring_system epss
scoring_elements 0.73682
published_at 2026-04-04T12:55:00Z
6
value 0.00781
scoring_system epss
scoring_elements 0.73654
published_at 2026-04-07T12:55:00Z
7
value 0.00781
scoring_system epss
scoring_elements 0.7369
published_at 2026-04-08T12:55:00Z
8
value 0.00781
scoring_system epss
scoring_elements 0.73703
published_at 2026-04-09T12:55:00Z
9
value 0.00781
scoring_system epss
scoring_elements 0.73724
published_at 2026-04-11T12:55:00Z
10
value 0.00781
scoring_system epss
scoring_elements 0.73706
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0635
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064514
reference_id 2064514
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064514
4
reference_url https://security.archlinux.org/ASA-202204-5
reference_id ASA-202204-5
reference_type
scores
url https://security.archlinux.org/ASA-202204-5
5
reference_url https://security.archlinux.org/AVG-2661
reference_id AVG-2661
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2661
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.1-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.1-1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2022-0635
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4bu-4ex7-37cd
51
url VCID-x9g2-pnfe-qyhh
vulnerability_id VCID-x9g2-pnfe-qyhh
summary bind: Too strict assertion check could be triggered when responses require UDP fragmentation if RRL is in use
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25218.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25218.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25218
reference_id
reference_type
scores
0
value 0.00584
scoring_system epss
scoring_elements 0.68945
published_at 2026-04-01T12:55:00Z
1
value 0.00584
scoring_system epss
scoring_elements 0.6906
published_at 2026-04-18T12:55:00Z
2
value 0.00584
scoring_system epss
scoring_elements 0.6901
published_at 2026-04-13T12:55:00Z
3
value 0.00584
scoring_system epss
scoring_elements 0.6905
published_at 2026-04-16T12:55:00Z
4
value 0.00584
scoring_system epss
scoring_elements 0.68963
published_at 2026-04-02T12:55:00Z
5
value 0.00584
scoring_system epss
scoring_elements 0.68983
published_at 2026-04-04T12:55:00Z
6
value 0.00584
scoring_system epss
scoring_elements 0.68962
published_at 2026-04-07T12:55:00Z
7
value 0.00584
scoring_system epss
scoring_elements 0.69013
published_at 2026-04-08T12:55:00Z
8
value 0.00584
scoring_system epss
scoring_elements 0.69032
published_at 2026-04-09T12:55:00Z
9
value 0.00584
scoring_system epss
scoring_elements 0.69054
published_at 2026-04-11T12:55:00Z
10
value 0.00584
scoring_system epss
scoring_elements 0.6904
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25218
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1995312
reference_id 1995312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1995312
4
reference_url https://security.archlinux.org/AVG-2303
reference_id AVG-2303
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2303
fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
aliases CVE-2021-25218
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x9g2-pnfe-qyhh
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie