Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/582765?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "type": "deb", "namespace": "debian", "name": "bind9", "version": "1:9.16.50-1~deb11u2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "1:9.18.47-1~deb12u1", "latest_non_vulnerable_version": "1:9.18.47-1~deb12u1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66829?format=api", "vulnerability_id": "VCID-2s8x-my3p-c7bd", "summary": "bind: Cache poisoning due to weak PRNG", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40780.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40780.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40780", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06472", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06559", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06582", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06576", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.065", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06491", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06541", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40780" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40780", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40780" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405829", "reference_id": "2405829", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405829" }, { "reference_url": "https://kb.isc.org/docs/cve-2025-40780", "reference_id": "cve-2025-40780", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-22T17:27:36Z/" } ], "url": "https://kb.isc.org/docs/cve-2025-40780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19793", "reference_id": "RHSA-2025:19793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19912", "reference_id": "RHSA-2025:19912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19912" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19950", "reference_id": "RHSA-2025:19950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19951", "reference_id": "RHSA-2025:19951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21034", "reference_id": "RHSA-2025:21034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21110", "reference_id": "RHSA-2025:21110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21111", "reference_id": "RHSA-2025:21111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21817", "reference_id": "RHSA-2025:21817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21887", "reference_id": "RHSA-2025:21887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21889", "reference_id": "RHSA-2025:21889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21939", "reference_id": "RHSA-2025:21939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21994", "reference_id": "RHSA-2025:21994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22168", "reference_id": "RHSA-2025:22168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0326", "reference_id": "RHSA-2026:0326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0332", "reference_id": "RHSA-2026:0332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0420", "reference_id": "RHSA-2026:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0674", "reference_id": "RHSA-2026:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0674" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0677", "reference_id": "RHSA-2026:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0702", "reference_id": "RHSA-2026:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0996", "reference_id": "RHSA-2026:0996", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0996" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1541", "reference_id": "RHSA-2026:1541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1541" }, { "reference_url": "https://usn.ubuntu.com/7836-1/", "reference_id": "USN-7836-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7836-1/" }, { "reference_url": "https://usn.ubuntu.com/7836-2/", "reference_id": "USN-7836-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7836-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api", "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-d9np-47r3-rkg1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1" } ], "aliases": [ "CVE-2025-40780" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2s8x-my3p-c7bd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66828?format=api", "vulnerability_id": "VCID-7swx-af28-yqaw", "summary": "bind: Cache poisoning attacks with unsolicited RRs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40778.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40778.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40778", "reference_id": "", "reference_type": "", "scores": [ { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00243", "published_at": "2026-04-04T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00235", "published_at": "2026-04-13T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00237", "published_at": "2026-04-11T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00236", "published_at": "2026-04-12T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00241", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405827", "reference_id": "2405827", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405827" }, { "reference_url": "https://kb.isc.org/docs/cve-2025-40778", "reference_id": "cve-2025-40778", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-07T04:56:12Z/" } ], "url": "https://kb.isc.org/docs/cve-2025-40778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19793", "reference_id": "RHSA-2025:19793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19835", "reference_id": "RHSA-2025:19835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19835" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19912", "reference_id": "RHSA-2025:19912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19912" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19950", "reference_id": "RHSA-2025:19950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19951", "reference_id": "RHSA-2025:19951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21034", "reference_id": "RHSA-2025:21034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21110", "reference_id": "RHSA-2025:21110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21111", "reference_id": "RHSA-2025:21111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21735", "reference_id": "RHSA-2025:21735", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21735" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21736", "reference_id": "RHSA-2025:21736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21740", "reference_id": "RHSA-2025:21740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21741", "reference_id": "RHSA-2025:21741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21817", "reference_id": "RHSA-2025:21817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21887", "reference_id": "RHSA-2025:21887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21889", "reference_id": "RHSA-2025:21889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21939", "reference_id": "RHSA-2025:21939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21994", "reference_id": "RHSA-2025:21994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22168", "reference_id": "RHSA-2025:22168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22205", "reference_id": "RHSA-2025:22205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23414", "reference_id": "RHSA-2025:23414", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23414" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0326", "reference_id": "RHSA-2026:0326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0332", "reference_id": "RHSA-2026:0332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0420", "reference_id": "RHSA-2026:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0674", "reference_id": "RHSA-2026:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0674" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0677", "reference_id": "RHSA-2026:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0702", "reference_id": "RHSA-2026:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0934", "reference_id": "RHSA-2026:0934", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0934" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0996", "reference_id": "RHSA-2026:0996", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0996" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1541", "reference_id": "RHSA-2026:1541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1541" }, { "reference_url": "https://usn.ubuntu.com/7836-1/", "reference_id": "USN-7836-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7836-1/" }, { "reference_url": "https://usn.ubuntu.com/7836-2/", "reference_id": "USN-7836-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7836-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api", "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-d9np-47r3-rkg1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1" } ], "aliases": [ "CVE-2025-40778" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7swx-af28-yqaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66830?format=api", "vulnerability_id": "VCID-auju-9h98-xkd1", "summary": "bind: Resource exhaustion via malformed DNSKEY handling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8677.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8677.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-8677", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24392", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24494", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2445", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24588", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24366", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24435", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8677" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405830", "reference_id": "2405830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405830" }, { "reference_url": "https://kb.isc.org/docs/cve-2025-8677", "reference_id": "cve-2025-8677", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-22T17:29:14Z/" } ], "url": "https://kb.isc.org/docs/cve-2025-8677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19912", "reference_id": "RHSA-2025:19912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19912" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19950", "reference_id": "RHSA-2025:19950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21034", "reference_id": "RHSA-2025:21034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21111", "reference_id": "RHSA-2025:21111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21994", "reference_id": "RHSA-2025:21994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0326", "reference_id": "RHSA-2026:0326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0332", "reference_id": "RHSA-2026:0332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0420", "reference_id": "RHSA-2026:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0674", "reference_id": "RHSA-2026:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0674" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0677", "reference_id": "RHSA-2026:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0702", "reference_id": "RHSA-2026:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0996", "reference_id": "RHSA-2026:0996", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0996" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1541", "reference_id": "RHSA-2026:1541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1541" }, { "reference_url": "https://usn.ubuntu.com/7836-1/", "reference_id": "USN-7836-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7836-1/" }, { "reference_url": "https://usn.ubuntu.com/7836-2/", "reference_id": "USN-7836-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7836-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api", "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-d9np-47r3-rkg1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1" } ], "aliases": [ "CVE-2025-8677" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-auju-9h98-xkd1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68619?format=api", "vulnerability_id": "VCID-d9np-47r3-rkg1", "summary": "bind: bind assertion failure", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40777.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40777.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40777", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04185", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04206", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06265", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06306", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07224", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07247", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40777" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381418", "reference_id": "2381418", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381418" }, { "reference_url": "https://kb.isc.org/docs/cve-2025-40777", "reference_id": "cve-2025-40777", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-18T14:25:41Z/" } ], "url": "https://kb.isc.org/docs/cve-2025-40777" }, { "reference_url": "https://usn.ubuntu.com/7641-1/", "reference_id": "USN-7641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585522?format=api", "purl": "pkg:deb/debian/bind9@1:9.18.47-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.47-1~deb12u1" } ], "aliases": [ "CVE-2025-40777" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d9np-47r3-rkg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49236?format=api", "vulnerability_id": "VCID-gdhz-6yzf-afda", "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2881.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2881.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2881", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.8716", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87203", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87177", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87174", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87195", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87202", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87214", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87207", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2881" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2881", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2881" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128594", "reference_id": "2128594", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128594" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/21/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:26:29Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3" }, { "reference_url": "https://kb.isc.org/docs/cve-2022-2881", "reference_id": "cve-2022-2881", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:26:29Z/" } ], "url": "https://kb.isc.org/docs/cve-2022-2881" }, { "reference_url": "https://security.gentoo.org/glsa/202210-25", "reference_id": "GLSA-202210-25", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:26:29Z/" } ], "url": "https://security.gentoo.org/glsa/202210-25" }, { "reference_url": "https://usn.ubuntu.com/5626-1/", "reference_id": "USN-5626-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5626-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api", "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-d9np-47r3-rkg1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1" } ], "aliases": [ "CVE-2022-2881" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gdhz-6yzf-afda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63996?format=api", "vulnerability_id": "VCID-unqt-mcxv-c7fw", "summary": "bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1519.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1519.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20746", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20636", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20679", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20659", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.206", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20805", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25811", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1519" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451305", "reference_id": "2451305", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451305" }, { "reference_url": "https://downloads.isc.org/isc/bind9/9.18.47", "reference_id": "9.18.47", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/" } ], "url": "https://downloads.isc.org/isc/bind9/9.18.47" }, { "reference_url": "https://downloads.isc.org/isc/bind9/9.20.21", "reference_id": "9.20.21", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/" } ], "url": "https://downloads.isc.org/isc/bind9/9.20.21" }, { "reference_url": "https://downloads.isc.org/isc/bind9/9.21.20", "reference_id": "9.21.20", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/" } ], "url": "https://downloads.isc.org/isc/bind9/9.21.20" }, { "reference_url": "https://kb.isc.org/docs/cve-2026-1519", "reference_id": "cve-2026-1519", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/" } ], "url": "https://kb.isc.org/docs/cve-2026-1519" }, { "reference_url": "https://usn.ubuntu.com/8124-1/", "reference_id": "USN-8124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api", "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-d9np-47r3-rkg1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1" } ], "aliases": [ "CVE-2026-1519" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unqt-mcxv-c7fw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71941?format=api", "vulnerability_id": "VCID-xz18-c263-nyap", "summary": "bind: bind9: Many records in the additional section cause CPU exhaustion", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11187.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11187.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11187", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04069", "scoring_system": "epss", "scoring_elements": "0.88542", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04069", "scoring_system": "epss", "scoring_elements": "0.88534", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04069", "scoring_system": "epss", "scoring_elements": "0.88539", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04069", "scoring_system": "epss", "scoring_elements": "0.8855", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04069", "scoring_system": "epss", "scoring_elements": "0.88495", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04069", "scoring_system": "epss", "scoring_elements": "0.88512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04069", "scoring_system": "epss", "scoring_elements": "0.88515", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11187" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094735", "reference_id": "1094735", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094735" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342879", "reference_id": "2342879", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342879" }, { "reference_url": "https://kb.isc.org/docs/cve-2024-11187", "reference_id": "cve-2024-11187", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T15:27:46Z/" } ], "url": "https://kb.isc.org/docs/cve-2024-11187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1664", "reference_id": "RHSA-2025:1664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1665", "reference_id": "RHSA-2025:1665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1666", "reference_id": "RHSA-2025:1666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1669", "reference_id": "RHSA-2025:1669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1670", "reference_id": "RHSA-2025:1670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1674", "reference_id": "RHSA-2025:1674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1674" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1675", "reference_id": "RHSA-2025:1675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1676", "reference_id": "RHSA-2025:1676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1678", "reference_id": "RHSA-2025:1678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1679", "reference_id": "RHSA-2025:1679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1681", "reference_id": "RHSA-2025:1681", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1681" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1684", "reference_id": "RHSA-2025:1684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1685", "reference_id": "RHSA-2025:1685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1685" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1687", "reference_id": "RHSA-2025:1687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1691", "reference_id": "RHSA-2025:1691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1718", "reference_id": "RHSA-2025:1718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1718" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1907", "reference_id": "RHSA-2025:1907", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1907" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1912", "reference_id": "RHSA-2025:1912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1912" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2588", "reference_id": "RHSA-2025:2588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3775", "reference_id": "RHSA-2025:3775", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3775" }, { "reference_url": "https://usn.ubuntu.com/7241-1/", "reference_id": "USN-7241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7241-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api", "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-d9np-47r3-rkg1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1" } ], "aliases": [ "CVE-2024-11187" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xz18-c263-nyap" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78326?format=api", "vulnerability_id": "VCID-3aue-fwnn-qkhu", "summary": "bind: named's configured cache size limit can be significantly exceeded", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2828.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2828.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2828", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.7513", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75137", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75205", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2828" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2911" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216227", "reference_id": "2216227", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216227" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/06/21/6", "reference_id": "6", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/06/21/6" }, { "reference_url": "https://kb.isc.org/docs/cve-2023-2828", "reference_id": "cve-2023-2828", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/" } ], "url": "https://kb.isc.org/docs/cve-2023-2828" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5439", "reference_id": "dsa-5439", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5439" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html", "reference_id": "msg00021.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230703-0010/", "reference_id": "ntap-20230703-0010", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230703-0010/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4005", "reference_id": "RHSA-2023:4005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4037", "reference_id": "RHSA-2023:4037", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4037" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4099", "reference_id": "RHSA-2023:4099", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4100", "reference_id": "RHSA-2023:4100", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4100" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4101", "reference_id": "RHSA-2023:4101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4102", "reference_id": "RHSA-2023:4102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4152", "reference_id": "RHSA-2023:4152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4153", "reference_id": "RHSA-2023:4153", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4153" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4154", "reference_id": "RHSA-2023:4154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4332", "reference_id": "RHSA-2023:4332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4332" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/", "reference_id": "SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/", "reference_id": "U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/" }, { "reference_url": "https://usn.ubuntu.com/6183-1/", "reference_id": "USN-6183-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6183-1/" }, { "reference_url": "https://usn.ubuntu.com/6183-2/", "reference_id": "USN-6183-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6183-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2023-2828" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3aue-fwnn-qkhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78327?format=api", "vulnerability_id": "VCID-3dmq-y6bw-83cx", "summary": "bind: Exceeding the recursive-clients quota may cause named to terminate unexpectedly when stale-answer-client-timeout is set to 0", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2911.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2911.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2911", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40897", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40871", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40925", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40853", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40902", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40909", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40926", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40891", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2911" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216228", "reference_id": "2216228", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216228" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/06/21/6", "reference_id": "6", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/06/21/6" }, { "reference_url": "https://kb.isc.org/docs/cve-2023-2911", "reference_id": "cve-2023-2911", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/" } ], "url": "https://kb.isc.org/docs/cve-2023-2911" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5439", "reference_id": "dsa-5439", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5439" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230703-0010/", "reference_id": "ntap-20230703-0010", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230703-0010/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/", "reference_id": "SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/", "reference_id": "U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/" }, { "reference_url": "https://usn.ubuntu.com/6183-1/", "reference_id": "USN-6183-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6183-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2023-2911" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3dmq-y6bw-83cx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77742?format=api", "vulnerability_id": "VCID-43p8-gtsg-f7ck", "summary": "bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5679.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5679.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5679", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34696", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34612", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34643", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34672", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34675", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34636", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/13/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/02/13/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263909", "reference_id": "2263909", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263909" }, { "reference_url": "https://kb.isc.org/docs/cve-2023-5679", "reference_id": "cve-2023-5679", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/" } ], "url": "https://kb.isc.org/docs/cve-2023-5679" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/", "reference_id": "HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0002/", "reference_id": "ntap-20240426-0002", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240426-0002/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/", "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/", "reference_id": "RGS7JN6FZXUSTC2XKQHH27574XOULYYJ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647", "reference_id": "RHSA-2024:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648", "reference_id": "RHSA-2024:1648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781", "reference_id": "RHSA-2024:1781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789", "reference_id": "RHSA-2024:1789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800", "reference_id": "RHSA-2024:1800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803", "reference_id": "RHSA-2024:1803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1803" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551", "reference_id": "RHSA-2024:2551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2551" }, { "reference_url": "https://usn.ubuntu.com/6633-1/", "reference_id": "USN-6633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6633-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/", "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2023-5679" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-43p8-gtsg-f7ck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80573?format=api", "vulnerability_id": "VCID-4nrz-wm5t-z3g5", "summary": "bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8625.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.26304", "scoring_system": "epss", "scoring_elements": "0.96269", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.26304", "scoring_system": "epss", "scoring_elements": "0.96308", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.26304", "scoring_system": "epss", "scoring_elements": "0.96301", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.26304", "scoring_system": "epss", "scoring_elements": "0.96305", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.26304", "scoring_system": "epss", "scoring_elements": "0.96276", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.26304", "scoring_system": "epss", "scoring_elements": "0.96284", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.26304", "scoring_system": "epss", "scoring_elements": "0.96288", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.26304", "scoring_system": "epss", "scoring_elements": "0.96297", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928486", "reference_id": "1928486", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928486" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983004", "reference_id": "983004", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983004" }, { "reference_url": "https://security.archlinux.org/ASA-202102-40", "reference_id": "ASA-202102-40", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-40" }, { "reference_url": "https://security.archlinux.org/AVG-1589", "reference_id": "AVG-1589", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0669", "reference_id": "RHSA-2021:0669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0670", "reference_id": "RHSA-2021:0670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0671", "reference_id": "RHSA-2021:0671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0672", "reference_id": "RHSA-2021:0672", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0672" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0691", "reference_id": "RHSA-2021:0691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0692", "reference_id": "RHSA-2021:0692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0692" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0693", "reference_id": "RHSA-2021:0693", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0693" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0694", "reference_id": "RHSA-2021:0694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0727", "reference_id": "RHSA-2021:0727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0922", "reference_id": "RHSA-2021:0922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0922" }, { "reference_url": "https://usn.ubuntu.com/4737-1/", "reference_id": "USN-4737-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4737-1/" }, { "reference_url": "https://usn.ubuntu.com/4737-2/", "reference_id": "USN-4737-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4737-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2020-8625" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4nrz-wm5t-z3g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61443?format=api", "vulnerability_id": "VCID-5bun-yx8z-qka6", "summary": "Multiple vulnerabilities have been found in BIND, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8620.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8620.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8620", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08369", "scoring_system": "epss", "scoring_elements": "0.9227", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08369", "scoring_system": "epss", "scoring_elements": "0.92277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08369", "scoring_system": "epss", "scoring_elements": "0.92283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08369", "scoring_system": "epss", "scoring_elements": "0.92285", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08369", "scoring_system": "epss", "scoring_elements": "0.92297", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08369", "scoring_system": "epss", "scoring_elements": "0.92301", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08369", "scoring_system": "epss", "scoring_elements": "0.92306", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08369", "scoring_system": "epss", "scoring_elements": "0.92307", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08369", "scoring_system": "epss", "scoring_elements": "0.92305", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8620" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869468", "reference_id": "1869468", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869468" }, { "reference_url": "https://security.gentoo.org/glsa/202008-19", "reference_id": "GLSA-202008-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-19" }, { "reference_url": "https://usn.ubuntu.com/4468-1/", "reference_id": "USN-4468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4468-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2020-8620" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5bun-yx8z-qka6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61444?format=api", "vulnerability_id": "VCID-5mjw-b7k7-h7er", "summary": "Multiple vulnerabilities have been found in BIND, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8621.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8621.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8621", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04879", "scoring_system": "epss", "scoring_elements": "0.89531", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04879", "scoring_system": "epss", "scoring_elements": "0.89535", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04879", "scoring_system": "epss", "scoring_elements": "0.89548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04879", "scoring_system": "epss", "scoring_elements": "0.8955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04879", "scoring_system": "epss", "scoring_elements": "0.89566", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04879", "scoring_system": "epss", "scoring_elements": "0.89571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04879", "scoring_system": "epss", "scoring_elements": "0.89578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04879", "scoring_system": "epss", "scoring_elements": "0.89577", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8621" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869471", "reference_id": "1869471", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869471" }, { "reference_url": "https://security.gentoo.org/glsa/202008-19", "reference_id": "GLSA-202008-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-19" }, { "reference_url": "https://usn.ubuntu.com/4468-1/", "reference_id": "USN-4468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4468-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2020-8621" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5mjw-b7k7-h7er" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49239?format=api", "vulnerability_id": "VCID-5yaa-23ds-bbby", "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38177.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38177.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38177", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01164", "scoring_system": "epss", "scoring_elements": "0.78572", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01164", "scoring_system": "epss", "scoring_elements": "0.78615", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01164", "scoring_system": "epss", "scoring_elements": "0.78603", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01164", "scoring_system": "epss", "scoring_elements": "0.78585", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01164", "scoring_system": "epss", "scoring_elements": "0.7861", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01164", "scoring_system": "epss", "scoring_elements": "0.78617", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01164", "scoring_system": "epss", "scoring_elements": "0.78641", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01164", "scoring_system": "epss", "scoring_elements": "0.78623", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601", "reference_id": "2128601", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/21/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/", "reference_id": "CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/" }, { "reference_url": "https://kb.isc.org/docs/cve-2022-38177", "reference_id": "cve-2022-38177", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/" } ], "url": "https://kb.isc.org/docs/cve-2022-38177" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5235", "reference_id": "dsa-5235", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5235" }, { "reference_url": "https://security.gentoo.org/glsa/202210-25", "reference_id": "GLSA-202210-25", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/" } ], "url": "https://security.gentoo.org/glsa/202210-25" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/", "reference_id": "MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221228-0010/", "reference_id": "ntap-20221228-0010", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221228-0010/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6763", "reference_id": "RHSA-2022:6763", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6763" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6764", "reference_id": "RHSA-2022:6764", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6764" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6765", "reference_id": "RHSA-2022:6765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6778", "reference_id": "RHSA-2022:6778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6779", "reference_id": "RHSA-2022:6779", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6780", "reference_id": "RHSA-2022:6780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6781", "reference_id": "RHSA-2022:6781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8598", "reference_id": "RHSA-2022:8598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8598" }, { "reference_url": "https://usn.ubuntu.com/5626-1/", "reference_id": "USN-5626-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5626-1/" }, { "reference_url": "https://usn.ubuntu.com/5626-2/", "reference_id": "USN-5626-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5626-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/", "reference_id": "YZJQNUASODNVAWZV6STKG5SD6XIJ446S", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2022-38177" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5yaa-23ds-bbby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61411?format=api", "vulnerability_id": "VCID-66sa-bc5p-jqde", "summary": "Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50387.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50387.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.51989", "scoring_system": "epss", "scoring_elements": "0.97913", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.51989", "scoring_system": "epss", "scoring_elements": "0.97912", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.51989", "scoring_system": "epss", "scoring_elements": "0.97909", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.51989", "scoring_system": "epss", "scoring_elements": "0.97898", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.51989", "scoring_system": "epss", "scoring_elements": "0.97906", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.51989", "scoring_system": "epss", "scoring_elements": "0.97901", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.51989", "scoring_system": "epss", "scoring_elements": "0.97896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.51989", "scoring_system": "epss", "scoring_elements": "0.97914", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html", "reference_id": "017430.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845", "reference_id": "1063845", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852", "reference_id": "1063852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077750", "reference_id": "1077750", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077750" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/16/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/2" }, { "reference_url": "https://www.isc.org/blogs/2024-bind-security-release/", "reference_id": "2024-bind-security-release", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://www.isc.org/blogs/2024-bind-security-release/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263914", "reference_id": "2263914", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263914" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/16/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/3" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/", "reference_id": "6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/", "reference_id": "BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/" }, { "reference_url": "https://kb.isc.org/docs/cve-2023-50387", "reference_id": "cve-2023-50387", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://kb.isc.org/docs/cve-2023-50387" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-50387", "reference_id": "CVE-2023-50387", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-50387" }, { "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387", "reference_id": "CVE-2023-50387", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387" }, { "reference_url": "https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/", "reference_id": "dnssec_vulnerability_internet", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/" }, { "reference_url": "https://security.gentoo.org/glsa/202412-10", "reference_id": "GLSA-202412-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-10" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/", "reference_id": "HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/", "reference_id": "IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/" }, { "reference_url": "https://news.ycombinator.com/item?id=39367411", "reference_id": "item?id=39367411", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://news.ycombinator.com/item?id=39367411" }, { "reference_url": "https://news.ycombinator.com/item?id=39372384", "reference_id": "item?id=39372384", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://news.ycombinator.com/item?id=39372384" }, { "reference_url": "https://www.athene-center.de/aktuelles/key-trap", "reference_id": "key-trap", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://www.athene-center.de/aktuelles/key-trap" }, { "reference_url": "https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/", "reference_id": "keytrap-dns-attack-could-disable-large-parts-of-internet-researchers", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240307-0007/", "reference_id": "ntap-20240307-0007", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240307-0007/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/", "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html", "reference_id": "powerdns-advisory-2024-01.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/", "reference_id": "RGS7JN6FZXUSTC2XKQHH27574XOULYYJ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0965", "reference_id": "RHSA-2024:0965", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0965" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0977", "reference_id": "RHSA-2024:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0981", "reference_id": "RHSA-2024:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0982", "reference_id": "RHSA-2024:0982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:11003", "reference_id": "RHSA-2024:11003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:11003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1334", "reference_id": "RHSA-2024:1334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1335", "reference_id": "RHSA-2024:1335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1522", "reference_id": "RHSA-2024:1522", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1522" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1543", "reference_id": "RHSA-2024:1543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1544", "reference_id": "RHSA-2024:1544", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1544" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1545", "reference_id": "RHSA-2024:1545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647", "reference_id": "RHSA-2024:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648", "reference_id": "RHSA-2024:1648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781", "reference_id": "RHSA-2024:1781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1782", "reference_id": "RHSA-2024:1782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789", "reference_id": "RHSA-2024:1789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800", "reference_id": "RHSA-2024:1800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1801", "reference_id": "RHSA-2024:1801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803", "reference_id": "RHSA-2024:1803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1803" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1804", "reference_id": "RHSA-2024:1804", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1804" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551", "reference_id": "RHSA-2024:2551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2587", "reference_id": "RHSA-2024:2587", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2587" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2696", "reference_id": "RHSA-2024:2696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2696" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720", "reference_id": "RHSA-2024:2720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2721", "reference_id": "RHSA-2024:2721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2821", "reference_id": "RHSA-2024:2821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2890", "reference_id": "RHSA-2024:2890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3271", "reference_id": "RHSA-2024:3271", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3271" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3741", "reference_id": "RHSA-2024:3741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3877", "reference_id": "RHSA-2024:3877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3929", "reference_id": "RHSA-2024:3929", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3929" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0039", "reference_id": "RHSA-2025:0039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0039" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1219823", "reference_id": "show_bug.cgi?id=1219823", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1219823" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/", "reference_id": "SVYA42BLXUCIDLD35YIJPJSHDIADNYMP", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/" }, { "reference_url": "https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf", "reference_id": "Technical_Report_KeyTrap.pdf", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/", "reference_id": "TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/" }, { "reference_url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/", "reference_id": "unbound-1.19.1-released", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/", "reference_id": "UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/" }, { "reference_url": "https://usn.ubuntu.com/6633-1/", "reference_id": "USN-6633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6633-1/" }, { "reference_url": "https://usn.ubuntu.com/6642-1/", "reference_id": "USN-6642-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6642-1/" }, { "reference_url": "https://usn.ubuntu.com/6657-1/", "reference_id": "USN-6657-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6657-1/" }, { "reference_url": "https://usn.ubuntu.com/6657-2/", "reference_id": "USN-6657-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6657-2/" }, { "reference_url": "https://usn.ubuntu.com/6665-1/", "reference_id": "USN-6665-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6665-1/" }, { "reference_url": "https://usn.ubuntu.com/6723-1/", "reference_id": "USN-6723-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6723-1/" }, { "reference_url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1", "reference_id": "v5.7.1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/", "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2023-50387" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-66sa-bc5p-jqde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49233?format=api", "vulnerability_id": "VCID-67zf-a3r9-wqcv", "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25220.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25220.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25220", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.2851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.2855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28551", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28509", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29013", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29079", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29153", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29202", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064512", "reference_id": "2064512", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064512" }, { "reference_url": "https://security.archlinux.org/ASA-202204-5", "reference_id": "ASA-202204-5", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202204-5" }, { "reference_url": "https://security.archlinux.org/AVG-2661", "reference_id": "AVG-2661", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2661" }, { "reference_url": "https://security.gentoo.org/glsa/202210-25", "reference_id": "GLSA-202210-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7643", "reference_id": "RHSA-2022:7643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7790", "reference_id": "RHSA-2022:7790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8068", "reference_id": "RHSA-2022:8068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8385", "reference_id": "RHSA-2022:8385", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8385" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0402", "reference_id": "RHSA-2023:0402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720", "reference_id": "RHSA-2024:2720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21740", "reference_id": "RHSA-2025:21740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21741", "reference_id": "RHSA-2025:21741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21889", "reference_id": "RHSA-2025:21889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22168", "reference_id": "RHSA-2025:22168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23414", "reference_id": "RHSA-2025:23414", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23414" }, { "reference_url": "https://usn.ubuntu.com/5332-1/", "reference_id": "USN-5332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5332-1/" }, { "reference_url": "https://usn.ubuntu.com/5332-2/", "reference_id": "USN-5332-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5332-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2021-25220" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-67zf-a3r9-wqcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61445?format=api", "vulnerability_id": "VCID-6guk-trum-3bad", "summary": "Multiple vulnerabilities have been found in BIND, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8622.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8622.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8622", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02629", "scoring_system": "epss", "scoring_elements": "0.85607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02629", "scoring_system": "epss", "scoring_elements": "0.85619", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02629", "scoring_system": "epss", "scoring_elements": "0.85637", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02629", "scoring_system": "epss", "scoring_elements": "0.85644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02629", "scoring_system": "epss", "scoring_elements": "0.85664", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02629", "scoring_system": "epss", "scoring_elements": "0.85675", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02629", "scoring_system": "epss", "scoring_elements": "0.8569", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02629", "scoring_system": "epss", "scoring_elements": "0.85686", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02629", "scoring_system": "epss", "scoring_elements": "0.85682", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869473", "reference_id": "1869473", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869473" }, { "reference_url": "https://security.gentoo.org/glsa/202008-19", "reference_id": "GLSA-202008-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4183", "reference_id": "RHSA-2020:4183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4500", "reference_id": "RHSA-2020:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4992", "reference_id": "RHSA-2020:4992", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4992" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5011", "reference_id": "RHSA-2020:5011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5203", "reference_id": "RHSA-2020:5203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5203" }, { "reference_url": "https://usn.ubuntu.com/4468-1/", "reference_id": "USN-4468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4468-1/" }, { "reference_url": "https://usn.ubuntu.com/4468-2/", "reference_id": "USN-4468-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4468-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2020-8622" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6guk-trum-3bad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80330?format=api", "vulnerability_id": "VCID-7kh5-ba54-z3gy", "summary": "bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25215.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25215.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25215", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81066", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81086", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81073", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81034", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81062", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81068", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953857", "reference_id": "1953857", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953857" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987742", "reference_id": "987742", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987742" }, { "reference_url": "https://security.archlinux.org/ASA-202104-10", "reference_id": "ASA-202104-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-10" }, { "reference_url": "https://security.archlinux.org/AVG-1890", "reference_id": "AVG-1890", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1468", "reference_id": "RHSA-2021:1468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1469", "reference_id": "RHSA-2021:1469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1475", "reference_id": "RHSA-2021:1475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1476", "reference_id": "RHSA-2021:1476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1477", "reference_id": "RHSA-2021:1477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1478", "reference_id": "RHSA-2021:1478", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1478" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1479", "reference_id": "RHSA-2021:1479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1989", "reference_id": "RHSA-2021:1989", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1989" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2024", "reference_id": "RHSA-2021:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2028", "reference_id": "RHSA-2021:2028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2028" }, { "reference_url": "https://usn.ubuntu.com/4929-1/", "reference_id": "USN-4929-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4929-1/" }, { "reference_url": "https://usn.ubuntu.com/7739-1/", "reference_id": "USN-7739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2021-25215" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7kh5-ba54-z3gy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49232?format=api", "vulnerability_id": "VCID-8k3p-761z-f3e3", "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25219.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25219.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25219", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76379", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76394", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76383", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76412", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.7644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01039", "scoring_system": "epss", "scoring_elements": "0.77425", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01039", "scoring_system": "epss", "scoring_elements": "0.77421", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01039", "scoring_system": "epss", "scoring_elements": "0.77445", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25219" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017636", "reference_id": "2017636", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017636" }, { "reference_url": "https://security.archlinux.org/ASA-202110-12", "reference_id": "ASA-202110-12", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202110-12" }, { "reference_url": "https://security.archlinux.org/AVG-2502", "reference_id": "AVG-2502", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2502" }, { "reference_url": "https://security.gentoo.org/glsa/202210-25", "reference_id": "GLSA-202210-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2092", "reference_id": "RHSA-2022:2092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2092" }, { "reference_url": "https://usn.ubuntu.com/5126-1/", "reference_id": "USN-5126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5126-1/" }, { "reference_url": "https://usn.ubuntu.com/5126-2/", "reference_id": "USN-5126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5126-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2021-25219" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k3p-761z-f3e3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77740?format=api", "vulnerability_id": "VCID-9wd4-6az1-j7fp", "summary": "bind9: Parsing large DNS messages may cause excessive CPU load", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4408.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4408.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4408", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52746", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52803", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.5274", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52791", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52785", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52836", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52819", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/13/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/02/13/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263896", "reference_id": "2263896", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263896" }, { "reference_url": "https://kb.isc.org/docs/cve-2023-4408", "reference_id": "cve-2023-4408", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/" } ], "url": "https://kb.isc.org/docs/cve-2023-4408" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/", "reference_id": "HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0001/", "reference_id": "ntap-20240426-0001", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240426-0001/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/", "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/", "reference_id": "RGS7JN6FZXUSTC2XKQHH27574XOULYYJ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647", "reference_id": "RHSA-2024:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648", "reference_id": "RHSA-2024:1648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781", "reference_id": "RHSA-2024:1781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1782", "reference_id": "RHSA-2024:1782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789", "reference_id": "RHSA-2024:1789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800", "reference_id": "RHSA-2024:1800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803", "reference_id": "RHSA-2024:1803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1803" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551", "reference_id": "RHSA-2024:2551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720", "reference_id": "RHSA-2024:2720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2721", "reference_id": "RHSA-2024:2721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2821", "reference_id": "RHSA-2024:2821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2890", "reference_id": "RHSA-2024:2890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3271", "reference_id": "RHSA-2024:3271", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3271" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3741", "reference_id": "RHSA-2024:3741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0039", "reference_id": "RHSA-2025:0039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0039" }, { "reference_url": "https://usn.ubuntu.com/6633-1/", "reference_id": "USN-6633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6633-1/" }, { "reference_url": "https://usn.ubuntu.com/6642-1/", "reference_id": "USN-6642-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6642-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/", "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2023-4408" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wd4-6az1-j7fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78076?format=api", "vulnerability_id": "VCID-ak5q-p7gh-qbdj", "summary": "bind: stack exhaustion in control channel code may lead to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3341.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3341.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3341", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47907", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47935", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47928", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47877", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47929", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47948", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47925", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052416", "reference_id": "1052416", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052416" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/20/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/20/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239621", "reference_id": "2239621", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239621" }, { "reference_url": "https://kb.isc.org/docs/cve-2023-3341", "reference_id": "cve-2023-3341", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/" } ], "url": "https://kb.isc.org/docs/cve-2023-3341" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5504", "reference_id": "dsa-5504", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5504" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/", "reference_id": "IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00021.html", "reference_id": "msg00021.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00021.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231013-0003/", "reference_id": "ntap-20231013-0003", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231013-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5460", "reference_id": "RHSA-2023:5460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5473", "reference_id": "RHSA-2023:5473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5474", "reference_id": "RHSA-2023:5474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5526", "reference_id": "RHSA-2023:5526", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5526" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5527", "reference_id": "RHSA-2023:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5529", "reference_id": "RHSA-2023:5529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5689", "reference_id": "RHSA-2023:5689", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5689" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5690", "reference_id": "RHSA-2023:5690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5691", "reference_id": "RHSA-2023:5691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5771", "reference_id": "RHSA-2023:5771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0039", "reference_id": "RHSA-2025:0039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0039" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/", "reference_id": "U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/" }, { "reference_url": "https://usn.ubuntu.com/6390-1/", "reference_id": "USN-6390-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6390-1/" }, { "reference_url": "https://usn.ubuntu.com/6421-1/", "reference_id": "USN-6421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6421-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/", "reference_id": "VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2023-3341" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ak5q-p7gh-qbdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77741?format=api", "vulnerability_id": "VCID-b4tb-tn9e-f3gk", "summary": "bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5517.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5517.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5517", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34696", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34612", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34643", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34672", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34675", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34636", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/13/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/02/13/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263897", "reference_id": "2263897", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263897" }, { "reference_url": "https://kb.isc.org/docs/cve-2023-5517", "reference_id": "cve-2023-5517", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/" } ], "url": "https://kb.isc.org/docs/cve-2023-5517" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/", "reference_id": "HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240503-0006/", "reference_id": "ntap-20240503-0006", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240503-0006/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/", "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/", "reference_id": "RGS7JN6FZXUSTC2XKQHH27574XOULYYJ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647", "reference_id": "RHSA-2024:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648", "reference_id": "RHSA-2024:1648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781", "reference_id": "RHSA-2024:1781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789", "reference_id": "RHSA-2024:1789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800", "reference_id": "RHSA-2024:1800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803", "reference_id": "RHSA-2024:1803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1803" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551", "reference_id": "RHSA-2024:2551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2551" }, { "reference_url": "https://usn.ubuntu.com/6633-1/", "reference_id": "USN-6633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6633-1/" }, { "reference_url": "https://usn.ubuntu.com/6642-1/", "reference_id": "USN-6642-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6642-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/", "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2023-5517" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4tb-tn9e-f3gk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79771?format=api", "vulnerability_id": "VCID-e5ez-2bba-zke3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8617.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8617.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8617", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.89736", "scoring_system": "epss", "scoring_elements": "0.99565", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.89736", "scoring_system": "epss", "scoring_elements": "0.99566", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.89827", "scoring_system": "epss", "scoring_elements": "0.99567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92629", "scoring_system": "epss", "scoring_elements": "0.99745", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.92629", "scoring_system": "epss", "scoring_elements": "0.99746", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836124", "reference_id": "1836124", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836124" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961939", "reference_id": "961939", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961939" }, { "reference_url": "https://security.archlinux.org/ASA-202005-13", "reference_id": "ASA-202005-13", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202005-13" }, { "reference_url": "https://security.archlinux.org/AVG-1165", "reference_id": "AVG-1165", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1165" }, { "reference_url": "https://github.com/knqyf263/CVE-2020-8617/blob/92a64e68cf77a5b938e0d9c04524fa6147ccb785/exploit.py", "reference_id": "CVE-2020-8617", "reference_type": "exploit", "scores": [], "url": "https://github.com/knqyf263/CVE-2020-8617/blob/92a64e68cf77a5b938e0d9c04524fa6147ccb785/exploit.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/48521.py", "reference_id": "CVE-2020-8617", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/48521.py" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2338", "reference_id": "RHSA-2020:2338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2344", "reference_id": "RHSA-2020:2344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2345", "reference_id": "RHSA-2020:2345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2345" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2383", "reference_id": "RHSA-2020:2383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2404", "reference_id": "RHSA-2020:2404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2893", "reference_id": "RHSA-2020:2893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3378", "reference_id": "RHSA-2020:3378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3379", "reference_id": "RHSA-2020:3379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3433", "reference_id": "RHSA-2020:3433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3470", "reference_id": "RHSA-2020:3470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3471", "reference_id": "RHSA-2020:3471", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3471" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3475", "reference_id": "RHSA-2020:3475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3475" }, { "reference_url": "https://usn.ubuntu.com/4365-1/", "reference_id": "USN-4365-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4365-1/" }, { "reference_url": "https://usn.ubuntu.com/4365-2/", "reference_id": "USN-4365-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4365-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037004?format=api", "purl": "pkg:deb/debian/bind9@1:9.10.3.dfsg.P4-12.3%2Bdeb9u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wga-mp91-7kdf" }, { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-3kvk-745c-tfaf" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-4sf3-myam-p3bp" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5sed-29xc-rud6" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7hgq-t98y-gyf9" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-ddg3-vmpb-cbhs" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-e8xu-cq82-x3bw" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-s9ua-j61v-jbch" }, { "vulnerability": "VCID-sna2-5cuy-4fa2" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-tg7b-ra4c-cue1" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-wy6z-uskq-n7cs" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-y8gc-me2s-ubfg" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.10.3.dfsg.P4-12.3%252Bdeb9u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2020-8617" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e5ez-2bba-zke3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61446?format=api", "vulnerability_id": "VCID-emc6-37uv-xub8", "summary": "Multiple vulnerabilities have been found in BIND, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8623.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.18318", "scoring_system": "epss", "scoring_elements": "0.95178", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.18318", "scoring_system": "epss", "scoring_elements": "0.9519", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.18318", "scoring_system": "epss", "scoring_elements": "0.95192", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.18318", "scoring_system": "epss", "scoring_elements": "0.95195", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.18318", "scoring_system": "epss", "scoring_elements": "0.95203", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.18318", "scoring_system": "epss", "scoring_elements": "0.95207", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.18318", "scoring_system": "epss", "scoring_elements": "0.95212", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.18318", "scoring_system": "epss", "scoring_elements": "0.95213", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.18318", "scoring_system": "epss", "scoring_elements": "0.95216", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869477", "reference_id": "1869477", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869477" }, { "reference_url": "https://security.gentoo.org/glsa/202008-19", "reference_id": "GLSA-202008-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4500", "reference_id": "RHSA-2020:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4992", "reference_id": "RHSA-2020:4992", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4992" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5011", "reference_id": "RHSA-2020:5011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5203", "reference_id": "RHSA-2020:5203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5203" }, { "reference_url": "https://usn.ubuntu.com/4468-1/", "reference_id": "USN-4468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4468-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2020-8623" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-emc6-37uv-xub8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81149?format=api", "vulnerability_id": "VCID-gqmy-rkkq-mkgj", "summary": "bind: A buffer boundary check assertion in rdataset.c can fail incorrectly during zone transfer", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8618.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8618.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8618", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01297", "scoring_system": "epss", "scoring_elements": "0.7965", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01297", "scoring_system": "epss", "scoring_elements": "0.79698", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01297", "scoring_system": "epss", "scoring_elements": "0.79721", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01297", "scoring_system": "epss", "scoring_elements": "0.79704", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01297", "scoring_system": "epss", "scoring_elements": "0.79656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01297", "scoring_system": "epss", "scoring_elements": "0.79678", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01297", "scoring_system": "epss", "scoring_elements": "0.79664", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01297", "scoring_system": "epss", "scoring_elements": "0.79692", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01297", "scoring_system": "epss", "scoring_elements": "0.797", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8618" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847242", "reference_id": "1847242", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847242" }, { "reference_url": "https://security.archlinux.org/ASA-202006-13", "reference_id": "ASA-202006-13", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-13" }, { "reference_url": "https://security.archlinux.org/AVG-1191", "reference_id": "AVG-1191", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1191" }, { "reference_url": "https://usn.ubuntu.com/4399-1/", "reference_id": "USN-4399-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4399-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2020-8618" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqmy-rkkq-mkgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49240?format=api", "vulnerability_id": "VCID-hb26-udtw-6uhy", "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38178.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38178.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38178", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80593", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80545", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80559", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80588", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80597", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80614", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80601", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602", "reference_id": "2128602", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/21/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3" }, { "reference_url": "https://security.archlinux.org/AVG-2811", "reference_id": "AVG-2811", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/", "reference_id": "CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/" }, { "reference_url": "https://kb.isc.org/docs/cve-2022-38178", "reference_id": "cve-2022-38178", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/" } ], "url": "https://kb.isc.org/docs/cve-2022-38178" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5235", "reference_id": "dsa-5235", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5235" }, { "reference_url": "https://security.gentoo.org/glsa/202210-25", "reference_id": "GLSA-202210-25", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/" } ], "url": "https://security.gentoo.org/glsa/202210-25" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/", "reference_id": "MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221228-0009/", "reference_id": "ntap-20221228-0009", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221228-0009/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6763", "reference_id": "RHSA-2022:6763", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6763" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6764", "reference_id": "RHSA-2022:6764", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6764" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6765", "reference_id": "RHSA-2022:6765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6778", "reference_id": "RHSA-2022:6778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6779", "reference_id": "RHSA-2022:6779", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6780", "reference_id": "RHSA-2022:6780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6781", "reference_id": "RHSA-2022:6781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8598", "reference_id": "RHSA-2022:8598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8598" }, { "reference_url": "https://usn.ubuntu.com/5626-1/", "reference_id": "USN-5626-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5626-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/", "reference_id": "YZJQNUASODNVAWZV6STKG5SD6XIJ446S", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2022-38178" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hb26-udtw-6uhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74687?format=api", "vulnerability_id": "VCID-jh5e-m42g-4bb3", "summary": "bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4076.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4076.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4076", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.2031", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20458", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20518", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20243", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20411", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20366", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/23/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T15:10:37Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/23/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/31/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T15:10:37Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/31/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298904", "reference_id": "2298904", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298904" }, { "reference_url": "https://kb.isc.org/docs/cve-2024-4076", "reference_id": "cve-2024-4076", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T15:10:37Z/" } ], "url": "https://kb.isc.org/docs/cve-2024-4076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5231", "reference_id": "RHSA-2024:5231", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5231" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5390", "reference_id": "RHSA-2024:5390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5418", "reference_id": "RHSA-2024:5418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5525", "reference_id": "RHSA-2024:5525", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5525" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5813", "reference_id": "RHSA-2024:5813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5813" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5907", "reference_id": "RHSA-2024:5907", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5907" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6004", "reference_id": "RHSA-2024:6004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6013", "reference_id": "RHSA-2024:6013", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6013" }, { "reference_url": "https://usn.ubuntu.com/6909-1/", "reference_id": "USN-6909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6909-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2024-4076" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jh5e-m42g-4bb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78711?format=api", "vulnerability_id": "VCID-jp5u-p7cf-43dw", "summary": "bind: flooding with UPDATE requests may lead to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3094.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3094.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3094", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01445", "scoring_system": "epss", "scoring_elements": "0.80715", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01445", "scoring_system": "epss", "scoring_elements": "0.80694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0168", "scoring_system": "epss", "scoring_elements": "0.82172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0168", "scoring_system": "epss", "scoring_elements": "0.82168", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0168", "scoring_system": "epss", "scoring_elements": "0.82187", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0168", "scoring_system": "epss", "scoring_elements": "0.82178", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0168", "scoring_system": "epss", "scoring_elements": "0.82134", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0168", "scoring_system": "epss", "scoring_elements": "0.82161", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164032", "reference_id": "2164032", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164032" }, { "reference_url": "https://kb.isc.org/docs/cve-2022-3094", "reference_id": "cve-2022-3094", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:48:11Z/" } ], "url": "https://kb.isc.org/docs/cve-2022-3094" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2261", "reference_id": "RHSA-2023:2261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2792", "reference_id": "RHSA-2023:2792", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2792" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7177", "reference_id": "RHSA-2023:7177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1406", "reference_id": "RHSA-2024:1406", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1406" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720", "reference_id": "RHSA-2024:2720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2720" }, { "reference_url": "https://usn.ubuntu.com/5827-1/", "reference_id": "USN-5827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5827-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2022-3094" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jp5u-p7cf-43dw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49235?format=api", "vulnerability_id": "VCID-kpsw-dq9w-pkdr", "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2795.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2795.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2795", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65706", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65669", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65699", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65665", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65716", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65728", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.6575", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65735", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2795" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128584", "reference_id": "2128584", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128584" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/21/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3" }, { "reference_url": "https://security.archlinux.org/AVG-2811", "reference_id": "AVG-2811", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/", "reference_id": "CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/" }, { "reference_url": "https://kb.isc.org/docs/cve-2022-2795", "reference_id": "cve-2022-2795", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/" } ], "url": "https://kb.isc.org/docs/cve-2022-2795" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5235", "reference_id": "dsa-5235", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5235" }, { "reference_url": "https://security.gentoo.org/glsa/202210-25", "reference_id": "GLSA-202210-25", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/" } ], "url": "https://security.gentoo.org/glsa/202210-25" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/", "reference_id": "MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0402", "reference_id": "RHSA-2023:0402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2261", "reference_id": "RHSA-2023:2261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2792", "reference_id": "RHSA-2023:2792", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2792" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3002", "reference_id": "RHSA-2023:3002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720", "reference_id": "RHSA-2024:2720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2720" }, { "reference_url": "https://usn.ubuntu.com/5626-1/", "reference_id": "USN-5626-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5626-1/" }, { "reference_url": "https://usn.ubuntu.com/5626-2/", "reference_id": "USN-5626-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5626-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/", "reference_id": "YZJQNUASODNVAWZV6STKG5SD6XIJ446S", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2022-2795" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kpsw-dq9w-pkdr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77743?format=api", "vulnerability_id": "VCID-nfr5-81bf-fuc5", "summary": "bind9: Specific recursive query patterns may lead to an out-of-memory condition", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6516.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6516.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6516", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39303", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39362", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39277", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39332", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39349", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39361", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39322", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/13/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-20T16:01:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/02/13/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263911", "reference_id": "2263911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263911" }, { "reference_url": "https://kb.isc.org/docs/cve-2023-6516", "reference_id": "cve-2023-6516", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-20T16:01:15Z/" } ], "url": "https://kb.isc.org/docs/cve-2023-6516" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240503-0008/", "reference_id": "ntap-20240503-0008", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-20T16:01:15Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240503-0008/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/", "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-20T16:01:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647", "reference_id": "RHSA-2024:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648", "reference_id": "RHSA-2024:1648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781", "reference_id": "RHSA-2024:1781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789", "reference_id": "RHSA-2024:1789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800", "reference_id": "RHSA-2024:1800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803", "reference_id": "RHSA-2024:1803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1803" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551", "reference_id": "RHSA-2024:2551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2551" }, { "reference_url": "https://usn.ubuntu.com/6642-1/", "reference_id": "USN-6642-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6642-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/", "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-20T16:01:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2023-6516" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfr5-81bf-fuc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80329?format=api", "vulnerability_id": "VCID-pjk7-r6yh-ufak", "summary": "bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25214.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73117", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73171", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73196", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73177", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73127", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73148", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73123", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73158", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73172", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953849", "reference_id": "1953849", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953849" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987741", "reference_id": "987741", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987741" }, { "reference_url": "https://security.archlinux.org/ASA-202104-10", "reference_id": "ASA-202104-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-10" }, { "reference_url": "https://security.archlinux.org/AVG-1890", "reference_id": "AVG-1890", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3325", "reference_id": "RHSA-2021:3325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4384", "reference_id": "RHSA-2021:4384", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4384" }, { "reference_url": "https://usn.ubuntu.com/4929-1/", "reference_id": "USN-4929-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4929-1/" }, { "reference_url": "https://usn.ubuntu.com/7739-1/", "reference_id": "USN-7739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2021-25214" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pjk7-r6yh-ufak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81836?format=api", "vulnerability_id": "VCID-qk77-35nr-1qbd", "summary": "bind: TCP Pipelining doesn't limit TCP clients on a single connection", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6477.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6477.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6477", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90358", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.9036", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90372", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90376", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90389", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90404", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90397", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773617", "reference_id": "1773617", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773617" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945171", "reference_id": "945171", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1061", "reference_id": "RHSA-2020:1061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1845", "reference_id": "RHSA-2020:1845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1845" }, { "reference_url": "https://usn.ubuntu.com/4197-1/", "reference_id": "USN-4197-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4197-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2019-6477" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qk77-35nr-1qbd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81150?format=api", "vulnerability_id": "VCID-qknq-wu95-6ba7", "summary": "bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8619.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8619.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8619", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06931", "scoring_system": "epss", "scoring_elements": "0.91367", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06931", "scoring_system": "epss", "scoring_elements": "0.91417", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06931", "scoring_system": "epss", "scoring_elements": "0.91415", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06931", "scoring_system": "epss", "scoring_elements": "0.91418", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06931", "scoring_system": "epss", "scoring_elements": "0.91373", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06931", "scoring_system": "epss", "scoring_elements": "0.91383", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06931", "scoring_system": "epss", "scoring_elements": "0.91391", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06931", "scoring_system": "epss", "scoring_elements": "0.91403", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06931", "scoring_system": "epss", "scoring_elements": "0.91409", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847244", "reference_id": "1847244", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847244" }, { "reference_url": "https://security.archlinux.org/ASA-202006-13", "reference_id": "ASA-202006-13", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-13" }, { "reference_url": "https://security.archlinux.org/AVG-1191", "reference_id": "AVG-1191", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4500", "reference_id": "RHSA-2020:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4500" }, { "reference_url": "https://usn.ubuntu.com/4399-1/", "reference_id": "USN-4399-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4399-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2020-8619" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qknq-wu95-6ba7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80331?format=api", "vulnerability_id": "VCID-rd8n-tcus-zyg3", "summary": "bind: Vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25216.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25216.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25216", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.27744", "scoring_system": "epss", "scoring_elements": "0.96416", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.27744", "scoring_system": "epss", "scoring_elements": "0.9645", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.27744", "scoring_system": "epss", "scoring_elements": "0.96443", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.27744", "scoring_system": "epss", "scoring_elements": "0.96447", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.27744", "scoring_system": "epss", "scoring_elements": "0.96423", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.27744", "scoring_system": "epss", "scoring_elements": "0.96427", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.27744", "scoring_system": "epss", "scoring_elements": "0.96431", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.27744", "scoring_system": "epss", "scoring_elements": "0.96439", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953872", "reference_id": "1953872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953872" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987743", "reference_id": "987743", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987743" }, { "reference_url": "https://security.archlinux.org/ASA-202104-10", "reference_id": "ASA-202104-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-10" }, { "reference_url": "https://security.archlinux.org/AVG-1890", "reference_id": "AVG-1890", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1890" }, { "reference_url": "https://usn.ubuntu.com/4929-1/", "reference_id": "USN-4929-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4929-1/" }, { "reference_url": "https://usn.ubuntu.com/7739-1/", "reference_id": "USN-7739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2021-25216" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rd8n-tcus-zyg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49238?format=api", "vulnerability_id": "VCID-rgz6-urkq-ybch", "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3080.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3080.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3080", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.292", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29328", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29378", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2919", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29254", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29295", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29298", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29252", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3080" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128600", "reference_id": "2128600", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128600" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/21/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3" }, { "reference_url": "https://security.archlinux.org/AVG-2811", "reference_id": "AVG-2811", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/", "reference_id": "CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/" }, { "reference_url": "https://kb.isc.org/docs/cve-2022-3080", "reference_id": "cve-2022-3080", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/" } ], "url": "https://kb.isc.org/docs/cve-2022-3080" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5235", "reference_id": "dsa-5235", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5235" }, { "reference_url": "https://security.gentoo.org/glsa/202210-25", "reference_id": "GLSA-202210-25", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/" } ], "url": "https://security.gentoo.org/glsa/202210-25" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/", "reference_id": "MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240621-0002/", "reference_id": "ntap-20240621-0002", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240621-0002/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6763", "reference_id": "RHSA-2022:6763", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6763" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6781", "reference_id": "RHSA-2022:6781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6781" }, { "reference_url": "https://usn.ubuntu.com/5626-1/", "reference_id": "USN-5626-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5626-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/", "reference_id": "YZJQNUASODNVAWZV6STKG5SD6XIJ446S", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2022-3080" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgz6-urkq-ybch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79770?format=api", "vulnerability_id": "VCID-tg21-xnsh-t7c3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8616.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8616.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8616", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1534", "scoring_system": "epss", "scoring_elements": "0.946", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1534", "scoring_system": "epss", "scoring_elements": "0.94615", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1534", "scoring_system": "epss", "scoring_elements": "0.94608", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19393", "scoring_system": "epss", "scoring_elements": "0.9537", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19393", "scoring_system": "epss", "scoring_elements": "0.95373", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19393", "scoring_system": "epss", "scoring_elements": "0.95377", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19393", "scoring_system": "epss", "scoring_elements": "0.95363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19393", "scoring_system": "epss", "scoring_elements": "0.9538", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836118", "reference_id": "1836118", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836118" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961939", "reference_id": "961939", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961939" }, { "reference_url": "https://security.archlinux.org/ASA-202005-13", "reference_id": "ASA-202005-13", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202005-13" }, { "reference_url": "https://security.archlinux.org/AVG-1165", "reference_id": "AVG-1165", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2338", "reference_id": "RHSA-2020:2338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2344", "reference_id": "RHSA-2020:2344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2345", "reference_id": "RHSA-2020:2345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2345" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2383", "reference_id": "RHSA-2020:2383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2404", "reference_id": "RHSA-2020:2404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3272", "reference_id": "RHSA-2020:3272", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3272" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3378", "reference_id": "RHSA-2020:3378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3379", "reference_id": "RHSA-2020:3379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3433", "reference_id": "RHSA-2020:3433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3470", "reference_id": "RHSA-2020:3470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3471", "reference_id": "RHSA-2020:3471", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3471" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3475", "reference_id": "RHSA-2020:3475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3475" }, { "reference_url": "https://usn.ubuntu.com/4365-1/", "reference_id": "USN-4365-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4365-1/" }, { "reference_url": "https://usn.ubuntu.com/4365-2/", "reference_id": "USN-4365-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4365-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037004?format=api", "purl": "pkg:deb/debian/bind9@1:9.10.3.dfsg.P4-12.3%2Bdeb9u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wga-mp91-7kdf" }, { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-3kvk-745c-tfaf" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-4sf3-myam-p3bp" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5sed-29xc-rud6" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7hgq-t98y-gyf9" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-ddg3-vmpb-cbhs" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-e8xu-cq82-x3bw" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-s9ua-j61v-jbch" }, { "vulnerability": "VCID-sna2-5cuy-4fa2" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-tg7b-ra4c-cue1" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-wy6z-uskq-n7cs" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-y8gc-me2s-ubfg" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.10.3.dfsg.P4-12.3%252Bdeb9u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2020-8616" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tg21-xnsh-t7c3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74686?format=api", "vulnerability_id": "VCID-ue3u-3a17-8uej", "summary": "bind9: bind: SIG(0) can be used to exhaust CPU resources", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1975.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1975.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1975", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34546", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34641", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34667", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34536", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34608", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34609", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.3457", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/23/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T17:12:04Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/23/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/31/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T17:12:04Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/31/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298901", "reference_id": "2298901", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298901" }, { "reference_url": "https://kb.isc.org/docs/cve-2024-1975", "reference_id": "cve-2024-1975", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T17:12:04Z/" } ], "url": "https://kb.isc.org/docs/cve-2024-1975" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5231", "reference_id": "RHSA-2024:5231", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5231" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5390", "reference_id": "RHSA-2024:5390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5418", "reference_id": "RHSA-2024:5418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5524", "reference_id": "RHSA-2024:5524", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5524" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5525", "reference_id": "RHSA-2024:5525", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5525" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5655", "reference_id": "RHSA-2024:5655", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5655" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5813", "reference_id": "RHSA-2024:5813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5813" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5838", "reference_id": "RHSA-2024:5838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5871", "reference_id": "RHSA-2024:5871", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5871" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5894", "reference_id": "RHSA-2024:5894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5907", "reference_id": "RHSA-2024:5907", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5907" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5908", "reference_id": "RHSA-2024:5908", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5930", "reference_id": "RHSA-2024:5930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6004", "reference_id": "RHSA-2024:6004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6013", "reference_id": "RHSA-2024:6013", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6013" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6642", "reference_id": "RHSA-2024:6642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6642" }, { "reference_url": "https://usn.ubuntu.com/6909-1/", "reference_id": "USN-6909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6909-1/" }, { "reference_url": "https://usn.ubuntu.com/6909-2/", "reference_id": "USN-6909-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6909-2/" }, { "reference_url": "https://usn.ubuntu.com/6909-3/", "reference_id": "USN-6909-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6909-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2024-1975" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ue3u-3a17-8uej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78713?format=api", "vulnerability_id": "VCID-vc7v-cqr1-jkcd", "summary": "bind: sending specific queries to the resolver may cause a DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3924.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3924.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3924", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00827", "scoring_system": "epss", "scoring_elements": "0.74471", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00827", "scoring_system": "epss", "scoring_elements": "0.74444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76516", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76517", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76543", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76522", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76474", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76506", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164039", "reference_id": "2164039", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164039" }, { "reference_url": "https://kb.isc.org/docs/cve-2022-3924", "reference_id": "cve-2022-3924", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-31T13:57:22Z/" } ], "url": "https://kb.isc.org/docs/cve-2022-3924" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2261", "reference_id": "RHSA-2023:2261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2792", "reference_id": "RHSA-2023:2792", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2792" }, { "reference_url": "https://usn.ubuntu.com/5827-1/", "reference_id": "USN-5827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5827-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2022-3924" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vc7v-cqr1-jkcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61412?format=api", "vulnerability_id": "VCID-vprj-j7u6-zbe7", "summary": "Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50868.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50868.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50868", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11802", "scoring_system": "epss", "scoring_elements": "0.93712", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11802", "scoring_system": "epss", "scoring_elements": "0.93708", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11802", "scoring_system": "epss", "scoring_elements": "0.93706", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11802", "scoring_system": "epss", "scoring_elements": "0.93696", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11802", "scoring_system": "epss", "scoring_elements": "0.93684", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11802", "scoring_system": "epss", "scoring_elements": "0.93713", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11802", "scoring_system": "epss", "scoring_elements": "0.93694", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html", "reference_id": "017430.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845", "reference_id": "1063845", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852", "reference_id": "1063852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077751", "reference_id": "1077751", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077751" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/16/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/2" }, { "reference_url": "https://www.isc.org/blogs/2024-bind-security-release/", "reference_id": "2024-bind-security-release", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://www.isc.org/blogs/2024-bind-security-release/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263917", "reference_id": "2263917", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263917" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/16/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/3" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/", "reference_id": "6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/", "reference_id": "BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/" }, { "reference_url": "https://kb.isc.org/docs/cve-2023-50868", "reference_id": "cve-2023-50868", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://kb.isc.org/docs/cve-2023-50868" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-50868", "reference_id": "CVE-2023-50868", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-50868" }, { "reference_url": "https://security.gentoo.org/glsa/202412-10", "reference_id": "GLSA-202412-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-10" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/", "reference_id": "HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/", "reference_id": "IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240307-0008/", "reference_id": "ntap-20240307-0008", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240307-0008/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/", "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" }, { "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html", "reference_id": "powerdns-advisory-2024-01.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html" }, { "reference_url": "https://datatracker.ietf.org/doc/html/rfc5155", "reference_id": "rfc5155", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://datatracker.ietf.org/doc/html/rfc5155" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/", "reference_id": "RGS7JN6FZXUSTC2XKQHH27574XOULYYJ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0965", "reference_id": "RHSA-2024:0965", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0965" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0977", "reference_id": "RHSA-2024:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0981", "reference_id": "RHSA-2024:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0982", "reference_id": "RHSA-2024:0982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:11003", "reference_id": "RHSA-2024:11003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:11003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1334", "reference_id": "RHSA-2024:1334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1335", "reference_id": "RHSA-2024:1335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1522", "reference_id": "RHSA-2024:1522", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1522" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1543", "reference_id": "RHSA-2024:1543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1544", "reference_id": "RHSA-2024:1544", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1544" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1545", "reference_id": "RHSA-2024:1545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647", "reference_id": "RHSA-2024:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648", "reference_id": "RHSA-2024:1648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781", "reference_id": "RHSA-2024:1781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1782", "reference_id": "RHSA-2024:1782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789", "reference_id": "RHSA-2024:1789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800", "reference_id": "RHSA-2024:1800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1801", "reference_id": "RHSA-2024:1801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803", "reference_id": "RHSA-2024:1803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1803" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1804", "reference_id": "RHSA-2024:1804", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1804" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551", "reference_id": "RHSA-2024:2551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2587", "reference_id": "RHSA-2024:2587", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2587" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2696", "reference_id": "RHSA-2024:2696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2696" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720", "reference_id": "RHSA-2024:2720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2721", "reference_id": "RHSA-2024:2721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2821", "reference_id": "RHSA-2024:2821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2890", "reference_id": "RHSA-2024:2890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3271", "reference_id": "RHSA-2024:3271", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3271" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3741", "reference_id": "RHSA-2024:3741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3877", "reference_id": "RHSA-2024:3877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3929", "reference_id": "RHSA-2024:3929", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3929" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0039", "reference_id": "RHSA-2025:0039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0039" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1219826", "reference_id": "show_bug.cgi?id=1219826", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1219826" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/", "reference_id": "SVYA42BLXUCIDLD35YIJPJSHDIADNYMP", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/", "reference_id": "TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/" }, { "reference_url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/", "reference_id": "unbound-1.19.1-released", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/", "reference_id": "UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/" }, { "reference_url": "https://usn.ubuntu.com/6633-1/", "reference_id": "USN-6633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6633-1/" }, { "reference_url": "https://usn.ubuntu.com/6642-1/", "reference_id": "USN-6642-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6642-1/" }, { "reference_url": "https://usn.ubuntu.com/6657-1/", "reference_id": "USN-6657-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6657-1/" }, { "reference_url": "https://usn.ubuntu.com/6657-2/", "reference_id": "USN-6657-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6657-2/" }, { "reference_url": "https://usn.ubuntu.com/6665-1/", "reference_id": "USN-6665-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6665-1/" }, { "reference_url": "https://usn.ubuntu.com/6723-1/", "reference_id": "USN-6723-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6723-1/" }, { "reference_url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1", "reference_id": "v5.7.1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/", "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2023-50868" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vprj-j7u6-zbe7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74685?format=api", "vulnerability_id": "VCID-xprr-w4d5-m7dt", "summary": "bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1737.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1737.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1737", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38143", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38233", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38256", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38126", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38203", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38167", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/23/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T17:27:11Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/23/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/31/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T17:27:11Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/31/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298893", "reference_id": "2298893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298893" }, { "reference_url": "https://kb.isc.org/docs/cve-2024-1737", "reference_id": "cve-2024-1737", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T17:27:11Z/" } ], "url": "https://kb.isc.org/docs/cve-2024-1737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5231", "reference_id": "RHSA-2024:5231", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5231" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5390", "reference_id": "RHSA-2024:5390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5418", "reference_id": "RHSA-2024:5418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5524", "reference_id": "RHSA-2024:5524", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5524" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5525", "reference_id": "RHSA-2024:5525", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5525" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5655", "reference_id": "RHSA-2024:5655", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5655" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5813", "reference_id": "RHSA-2024:5813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5813" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5838", "reference_id": "RHSA-2024:5838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5871", "reference_id": "RHSA-2024:5871", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5871" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5894", "reference_id": "RHSA-2024:5894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5907", "reference_id": "RHSA-2024:5907", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5907" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5908", "reference_id": "RHSA-2024:5908", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5930", "reference_id": "RHSA-2024:5930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6004", "reference_id": "RHSA-2024:6004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6013", "reference_id": "RHSA-2024:6013", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6013" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6642", "reference_id": "RHSA-2024:6642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6642" }, { "reference_url": "https://kb.isc.org/docs/rrset-limits-in-zones", "reference_id": "rrset-limits-in-zones", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T17:27:11Z/" } ], "url": "https://kb.isc.org/docs/rrset-limits-in-zones" }, { "reference_url": "https://usn.ubuntu.com/6909-1/", "reference_id": "USN-6909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6909-1/" }, { "reference_url": "https://usn.ubuntu.com/6909-2/", "reference_id": "USN-6909-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6909-2/" }, { "reference_url": "https://usn.ubuntu.com/6909-3/", "reference_id": "USN-6909-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6909-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2024-1737" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xprr-w4d5-m7dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61447?format=api", "vulnerability_id": "VCID-yeqv-d2wz-6ybd", "summary": "Multiple vulnerabilities have been found in BIND, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8624.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81836", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81847", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.8187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81866", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81899", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81918", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81906", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81901", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869480", "reference_id": "1869480", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869480" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966497", "reference_id": "966497", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966497" }, { "reference_url": "https://security.gentoo.org/glsa/202008-19", "reference_id": "GLSA-202008-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4500", "reference_id": "RHSA-2020:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5011", "reference_id": "RHSA-2020:5011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5203", "reference_id": "RHSA-2020:5203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5203" }, { "reference_url": "https://usn.ubuntu.com/4468-1/", "reference_id": "USN-4468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4468-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api", "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-3aue-fwnn-qkhu" }, { "vulnerability": "VCID-3dmq-y6bw-83cx" }, { "vulnerability": "VCID-43p8-gtsg-f7ck" }, { "vulnerability": "VCID-4nrz-wm5t-z3g5" }, { "vulnerability": "VCID-5bun-yx8z-qka6" }, { "vulnerability": "VCID-5mjw-b7k7-h7er" }, { "vulnerability": "VCID-5yaa-23ds-bbby" }, { "vulnerability": "VCID-66sa-bc5p-jqde" }, { "vulnerability": "VCID-67zf-a3r9-wqcv" }, { "vulnerability": "VCID-6guk-trum-3bad" }, { "vulnerability": "VCID-7kh5-ba54-z3gy" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-8k3p-761z-f3e3" }, { "vulnerability": "VCID-9wd4-6az1-j7fp" }, { "vulnerability": "VCID-ak5q-p7gh-qbdj" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-b4tb-tn9e-f3gk" }, { "vulnerability": "VCID-e5ez-2bba-zke3" }, { "vulnerability": "VCID-emc6-37uv-xub8" }, { "vulnerability": "VCID-gqmy-rkkq-mkgj" }, { "vulnerability": "VCID-hb26-udtw-6uhy" }, { "vulnerability": "VCID-jh5e-m42g-4bb3" }, { "vulnerability": "VCID-jp5u-p7cf-43dw" }, { "vulnerability": "VCID-kpsw-dq9w-pkdr" }, { "vulnerability": "VCID-nfr5-81bf-fuc5" }, { "vulnerability": "VCID-pjk7-r6yh-ufak" }, { "vulnerability": "VCID-qk77-35nr-1qbd" }, { "vulnerability": "VCID-qknq-wu95-6ba7" }, { "vulnerability": "VCID-rd8n-tcus-zyg3" }, { "vulnerability": "VCID-rgz6-urkq-ybch" }, { "vulnerability": "VCID-tg21-xnsh-t7c3" }, { "vulnerability": "VCID-ue3u-3a17-8uej" }, { "vulnerability": "VCID-vc7v-cqr1-jkcd" }, { "vulnerability": "VCID-vprj-j7u6-zbe7" }, { "vulnerability": "VCID-xprr-w4d5-m7dt" }, { "vulnerability": "VCID-xz18-c263-nyap" }, { "vulnerability": "VCID-yeqv-d2wz-6ybd" }, { "vulnerability": "VCID-z9gk-jg1m-gfg6" }, { "vulnerability": "VCID-zgnn-ckqt-43fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2020-8624" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yeqv-d2wz-6ybd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78712?format=api", "vulnerability_id": "VCID-z9gk-jg1m-gfg6", "summary": "bind: sending specific queries to the resolver may cause a DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3736.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81656", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81634", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83032", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83027", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83043", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.82996", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.8302", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164038", "reference_id": "2164038", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164038" }, { "reference_url": "https://kb.isc.org/docs/cve-2022-3736", "reference_id": "cve-2022-3736", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-01T14:10:30Z/" } ], "url": "https://kb.isc.org/docs/cve-2022-3736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2261", "reference_id": "RHSA-2023:2261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2792", "reference_id": "RHSA-2023:2792", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2792" }, { "reference_url": "https://usn.ubuntu.com/5827-1/", "reference_id": "USN-5827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5827-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2022-3736" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z9gk-jg1m-gfg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49234?format=api", "vulnerability_id": "VCID-zgnn-ckqt-43fq", "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0396.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0396.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0396", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28578", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.2853", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28623", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28579", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28665", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.2871", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28516", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28581", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28621", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0396" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064513", "reference_id": "2064513", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064513" }, { "reference_url": "https://security.archlinux.org/ASA-202204-5", "reference_id": "ASA-202204-5", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202204-5" }, { "reference_url": "https://security.archlinux.org/AVG-2661", "reference_id": "AVG-2661", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2661" }, { "reference_url": "https://security.gentoo.org/glsa/202210-25", "reference_id": "GLSA-202210-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7643", "reference_id": "RHSA-2022:7643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8068", "reference_id": "RHSA-2022:8068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8068" }, { "reference_url": "https://usn.ubuntu.com/5332-1/", "reference_id": "USN-5332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5332-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api", "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2s8x-my3p-c7bd" }, { "vulnerability": "VCID-7swx-af28-yqaw" }, { "vulnerability": "VCID-auju-9h98-xkd1" }, { "vulnerability": "VCID-d9np-47r3-rkg1" }, { "vulnerability": "VCID-gdhz-6yzf-afda" }, { "vulnerability": "VCID-unqt-mcxv-c7fw" }, { "vulnerability": "VCID-xz18-c263-nyap" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" } ], "aliases": [ "CVE-2022-0396" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zgnn-ckqt-43fq" } ], "risk_score": "3.9", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2" }