Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-dns/bind@9.11.1_p1
Typeebuild
Namespacenet-dns
Namebind
Version9.11.1_p1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version9.12.1_p2-r1
Latest_non_vulnerable_version9.16.33
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5jpj-6zqd-3ub9
vulnerability_id VCID-5jpj-6zqd-3ub9
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9147.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9147
reference_id
reference_type
scores
0
value 0.56165
scoring_system epss
scoring_elements 0.98089
published_at 2026-04-01T12:55:00Z
1
value 0.56165
scoring_system epss
scoring_elements 0.98111
published_at 2026-04-24T12:55:00Z
2
value 0.56165
scoring_system epss
scoring_elements 0.98115
published_at 2026-04-18T12:55:00Z
3
value 0.56165
scoring_system epss
scoring_elements 0.9811
published_at 2026-04-21T12:55:00Z
4
value 0.56165
scoring_system epss
scoring_elements 0.98092
published_at 2026-04-02T12:55:00Z
5
value 0.56165
scoring_system epss
scoring_elements 0.98096
published_at 2026-04-07T12:55:00Z
6
value 0.56165
scoring_system epss
scoring_elements 0.98101
published_at 2026-04-09T12:55:00Z
7
value 0.56165
scoring_system epss
scoring_elements 0.98106
published_at 2026-04-12T12:55:00Z
8
value 0.56165
scoring_system epss
scoring_elements 0.98107
published_at 2026-04-13T12:55:00Z
9
value 0.56165
scoring_system epss
scoring_elements 0.98113
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411367
reference_id 1411367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411367
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851063
reference_id 851063
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851063
8
reference_url https://security.archlinux.org/ASA-201701-15
reference_id ASA-201701-15
reference_type
scores
url https://security.archlinux.org/ASA-201701-15
9
reference_url https://security.archlinux.org/AVG-132
reference_id AVG-132
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-132
10
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
11
reference_url https://access.redhat.com/errata/RHSA-2017:0062
reference_id RHSA-2017:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0062
12
reference_url https://access.redhat.com/errata/RHSA-2017:0063
reference_id RHSA-2017:0063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0063
13
reference_url https://access.redhat.com/errata/RHSA-2017:0064
reference_id RHSA-2017:0064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0064
14
reference_url https://access.redhat.com/errata/RHSA-2017:1582
reference_id RHSA-2017:1582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1582
15
reference_url https://access.redhat.com/errata/RHSA-2017:1583
reference_id RHSA-2017:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1583
16
reference_url https://usn.ubuntu.com/3172-1/
reference_id USN-3172-1
reference_type
scores
url https://usn.ubuntu.com/3172-1/
fixed_packages
0
url pkg:ebuild/net-dns/bind@9.11.1_p1
purl pkg:ebuild/net-dns/bind@9.11.1_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1
aliases CVE-2016-9147
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jpj-6zqd-3ub9
1
url VCID-7n8z-mhbn-xudt
vulnerability_id VCID-7n8z-mhbn-xudt
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9778.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9778
reference_id
reference_type
scores
0
value 0.0542
scoring_system epss
scoring_elements 0.9018
published_at 2026-04-24T12:55:00Z
1
value 0.0542
scoring_system epss
scoring_elements 0.90169
published_at 2026-04-18T12:55:00Z
2
value 0.0542
scoring_system epss
scoring_elements 0.90166
published_at 2026-04-21T12:55:00Z
3
value 0.06614
scoring_system epss
scoring_elements 0.91182
published_at 2026-04-13T12:55:00Z
4
value 0.06614
scoring_system epss
scoring_elements 0.9118
published_at 2026-04-11T12:55:00Z
5
value 0.06614
scoring_system epss
scoring_elements 0.91132
published_at 2026-04-01T12:55:00Z
6
value 0.06614
scoring_system epss
scoring_elements 0.91137
published_at 2026-04-02T12:55:00Z
7
value 0.06614
scoring_system epss
scoring_elements 0.91145
published_at 2026-04-04T12:55:00Z
8
value 0.06614
scoring_system epss
scoring_elements 0.91153
published_at 2026-04-07T12:55:00Z
9
value 0.06614
scoring_system epss
scoring_elements 0.91166
published_at 2026-04-08T12:55:00Z
10
value 0.06614
scoring_system epss
scoring_elements 0.91173
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9778
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://kb.isc.org/article/AA-01442/
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-01442/
4
reference_url https://security.netapp.com/advisory/ntap-20180926-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0005/
5
reference_url http://www.securityfocus.com/bid/95388
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95388
6
reference_url http://www.securitytracker.com/id/1037582
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037582
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411387
reference_id 1411387
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411387
8
reference_url https://security.archlinux.org/ASA-201701-15
reference_id ASA-201701-15
reference_type
scores
url https://security.archlinux.org/ASA-201701-15
9
reference_url https://security.archlinux.org/AVG-132
reference_id AVG-132
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-132
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s6:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:s6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s6:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9778
reference_id CVE-2016-9778
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9778
20
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
fixed_packages
0
url pkg:ebuild/net-dns/bind@9.11.1_p1
purl pkg:ebuild/net-dns/bind@9.11.1_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1
aliases CVE-2016-9778
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7n8z-mhbn-xudt
2
url VCID-ruf8-3syu-vyew
vulnerability_id VCID-ruf8-3syu-vyew
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3138.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3138
reference_id
reference_type
scores
0
value 0.3793
scoring_system epss
scoring_elements 0.97224
published_at 2026-04-24T12:55:00Z
1
value 0.3793
scoring_system epss
scoring_elements 0.97218
published_at 2026-04-16T12:55:00Z
2
value 0.3793
scoring_system epss
scoring_elements 0.9722
published_at 2026-04-18T12:55:00Z
3
value 0.38782
scoring_system epss
scoring_elements 0.97256
published_at 2026-04-13T12:55:00Z
4
value 0.38782
scoring_system epss
scoring_elements 0.97255
published_at 2026-04-11T12:55:00Z
5
value 0.38782
scoring_system epss
scoring_elements 0.97231
published_at 2026-04-01T12:55:00Z
6
value 0.38782
scoring_system epss
scoring_elements 0.97237
published_at 2026-04-02T12:55:00Z
7
value 0.38782
scoring_system epss
scoring_elements 0.97242
published_at 2026-04-04T12:55:00Z
8
value 0.38782
scoring_system epss
scoring_elements 0.97243
published_at 2026-04-07T12:55:00Z
9
value 0.38782
scoring_system epss
scoring_elements 0.9725
published_at 2026-04-08T12:55:00Z
10
value 0.38782
scoring_system epss
scoring_elements 0.97251
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://kb.isc.org/docs/aa-01471
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01471
7
reference_url https://security.netapp.com/advisory/ntap-20180802-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180802-0002/
8
reference_url https://www.debian.org/security/2017/dsa-3854
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3854
9
reference_url http://www.securityfocus.com/bid/97657
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97657
10
reference_url http://www.securitytracker.com/id/1038260
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038260
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1441137
reference_id 1441137
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1441137
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860226
reference_id 860226
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860226
13
reference_url https://security.archlinux.org/ASA-201704-11
reference_id ASA-201704-11
reference_type
scores
url https://security.archlinux.org/ASA-201704-11
14
reference_url https://security.archlinux.org/AVG-239
reference_id AVG-239
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-239
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p5:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p5:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p7:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p7:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:rc2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p2:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p4:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.1:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:b1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:rc2:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p2:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p4:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p5:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:p5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p5:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p6:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:p6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p6:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p7:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:p7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p7:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s7:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:s7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s7:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3138
reference_id CVE-2017-3138
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3138
52
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
53
reference_url https://usn.ubuntu.com/3259-1/
reference_id USN-3259-1
reference_type
scores
url https://usn.ubuntu.com/3259-1/
fixed_packages
0
url pkg:ebuild/net-dns/bind@9.11.1_p1
purl pkg:ebuild/net-dns/bind@9.11.1_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1
aliases CVE-2017-3138
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ruf8-3syu-vyew
3
url VCID-s4q2-n72q-vuhh
vulnerability_id VCID-s4q2-n72q-vuhh
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9444.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9444
reference_id
reference_type
scores
0
value 0.5046
scoring_system epss
scoring_elements 0.97823
published_at 2026-04-01T12:55:00Z
1
value 0.5046
scoring_system epss
scoring_elements 0.97853
published_at 2026-04-21T12:55:00Z
2
value 0.5046
scoring_system epss
scoring_elements 0.97852
published_at 2026-04-24T12:55:00Z
3
value 0.5046
scoring_system epss
scoring_elements 0.97855
published_at 2026-04-18T12:55:00Z
4
value 0.5046
scoring_system epss
scoring_elements 0.97829
published_at 2026-04-02T12:55:00Z
5
value 0.5046
scoring_system epss
scoring_elements 0.9783
published_at 2026-04-04T12:55:00Z
6
value 0.5046
scoring_system epss
scoring_elements 0.97833
published_at 2026-04-07T12:55:00Z
7
value 0.5046
scoring_system epss
scoring_elements 0.97837
published_at 2026-04-08T12:55:00Z
8
value 0.5046
scoring_system epss
scoring_elements 0.9784
published_at 2026-04-09T12:55:00Z
9
value 0.5046
scoring_system epss
scoring_elements 0.97843
published_at 2026-04-11T12:55:00Z
10
value 0.5046
scoring_system epss
scoring_elements 0.97845
published_at 2026-04-12T12:55:00Z
11
value 0.5046
scoring_system epss
scoring_elements 0.97846
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9444
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411377
reference_id 1411377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411377
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851062
reference_id 851062
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851062
8
reference_url https://security.archlinux.org/ASA-201701-15
reference_id ASA-201701-15
reference_type
scores
url https://security.archlinux.org/ASA-201701-15
9
reference_url https://security.archlinux.org/AVG-132
reference_id AVG-132
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-132
10
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
11
reference_url https://access.redhat.com/errata/RHSA-2017:0062
reference_id RHSA-2017:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0062
12
reference_url https://access.redhat.com/errata/RHSA-2017:1583
reference_id RHSA-2017:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1583
13
reference_url https://usn.ubuntu.com/3172-1/
reference_id USN-3172-1
reference_type
scores
url https://usn.ubuntu.com/3172-1/
fixed_packages
0
url pkg:ebuild/net-dns/bind@9.11.1_p1
purl pkg:ebuild/net-dns/bind@9.11.1_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1
aliases CVE-2016-9444
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4q2-n72q-vuhh
4
url VCID-sh9s-2ef5-ruct
vulnerability_id VCID-sh9s-2ef5-ruct
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3137.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3137.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3137
reference_id
reference_type
scores
0
value 0.28496
scoring_system epss
scoring_elements 0.96496
published_at 2026-04-01T12:55:00Z
1
value 0.28496
scoring_system epss
scoring_elements 0.96544
published_at 2026-04-24T12:55:00Z
2
value 0.28496
scoring_system epss
scoring_elements 0.96527
published_at 2026-04-12T12:55:00Z
3
value 0.28496
scoring_system epss
scoring_elements 0.9653
published_at 2026-04-13T12:55:00Z
4
value 0.28496
scoring_system epss
scoring_elements 0.96536
published_at 2026-04-16T12:55:00Z
5
value 0.28496
scoring_system epss
scoring_elements 0.96542
published_at 2026-04-18T12:55:00Z
6
value 0.28496
scoring_system epss
scoring_elements 0.96543
published_at 2026-04-21T12:55:00Z
7
value 0.28496
scoring_system epss
scoring_elements 0.96504
published_at 2026-04-02T12:55:00Z
8
value 0.28496
scoring_system epss
scoring_elements 0.96508
published_at 2026-04-04T12:55:00Z
9
value 0.28496
scoring_system epss
scoring_elements 0.96512
published_at 2026-04-07T12:55:00Z
10
value 0.28496
scoring_system epss
scoring_elements 0.9652
published_at 2026-04-08T12:55:00Z
11
value 0.28496
scoring_system epss
scoring_elements 0.96523
published_at 2026-04-09T12:55:00Z
12
value 0.28496
scoring_system epss
scoring_elements 0.96526
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3137
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://kb.isc.org/docs/aa-01466
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01466
7
reference_url https://security.netapp.com/advisory/ntap-20180802-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180802-0002/
8
reference_url https://www.debian.org/security/2017/dsa-3854
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3854
9
reference_url http://www.securityfocus.com/bid/97651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97651
10
reference_url http://www.securitytracker.com/id/1038258
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038258
11
reference_url http://www.securitytracker.com/id/1040195
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040195
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1441133
reference_id 1441133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1441133
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860225
reference_id 860225
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860225
14
reference_url https://security.archlinux.org/ASA-201704-11
reference_id ASA-201704-11
reference_type
scores
url https://security.archlinux.org/ASA-201704-11
15
reference_url https://security.archlinux.org/AVG-239
reference_id AVG-239
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-239
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.1:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:b1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p6:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:p6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p6:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s8:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:s8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s8:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3137
reference_id CVE-2017-3137
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3137
56
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
57
reference_url https://access.redhat.com/errata/RHSA-2017:1095
reference_id RHSA-2017:1095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1095
58
reference_url https://access.redhat.com/errata/RHSA-2017:1105
reference_id RHSA-2017:1105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1105
59
reference_url https://access.redhat.com/errata/RHSA-2017:1582
reference_id RHSA-2017:1582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1582
60
reference_url https://access.redhat.com/errata/RHSA-2017:1583
reference_id RHSA-2017:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1583
61
reference_url https://usn.ubuntu.com/3259-1/
reference_id USN-3259-1
reference_type
scores
url https://usn.ubuntu.com/3259-1/
fixed_packages
0
url pkg:ebuild/net-dns/bind@9.11.1_p1
purl pkg:ebuild/net-dns/bind@9.11.1_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1
aliases CVE-2017-3137
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sh9s-2ef5-ruct
5
url VCID-t4dn-73sn-57c1
vulnerability_id VCID-t4dn-73sn-57c1
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3140.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3140
reference_id
reference_type
scores
0
value 0.19519
scoring_system epss
scoring_elements 0.95366
published_at 2026-04-01T12:55:00Z
1
value 0.19519
scoring_system epss
scoring_elements 0.95418
published_at 2026-04-24T12:55:00Z
2
value 0.19519
scoring_system epss
scoring_elements 0.95393
published_at 2026-04-08T12:55:00Z
3
value 0.19519
scoring_system epss
scoring_elements 0.95395
published_at 2026-04-09T12:55:00Z
4
value 0.19519
scoring_system epss
scoring_elements 0.95401
published_at 2026-04-12T12:55:00Z
5
value 0.19519
scoring_system epss
scoring_elements 0.95403
published_at 2026-04-13T12:55:00Z
6
value 0.19519
scoring_system epss
scoring_elements 0.95411
published_at 2026-04-16T12:55:00Z
7
value 0.19519
scoring_system epss
scoring_elements 0.95415
published_at 2026-04-18T12:55:00Z
8
value 0.19519
scoring_system epss
scoring_elements 0.95375
published_at 2026-04-02T12:55:00Z
9
value 0.19519
scoring_system epss
scoring_elements 0.95382
published_at 2026-04-04T12:55:00Z
10
value 0.19519
scoring_system epss
scoring_elements 0.95386
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3140
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
4
reference_url https://kb.isc.org/docs/aa-01495
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01495
5
reference_url https://security.netapp.com/advisory/ntap-20180926-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0001/
6
reference_url http://www.securityfocus.com/bid/99088
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99088
7
reference_url http://www.securitytracker.com/id/1038692
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038692
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461302
reference_id 1461302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461302
9
reference_url https://security.archlinux.org/ASA-201706-18
reference_id ASA-201706-18
reference_type
scores
url https://security.archlinux.org/ASA-201706-18
10
reference_url https://security.archlinux.org/AVG-301
reference_id AVG-301
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-301
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:s1:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3140
reference_id CVE-2017-3140
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3140
20
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
fixed_packages
0
url pkg:ebuild/net-dns/bind@9.11.1_p1
purl pkg:ebuild/net-dns/bind@9.11.1_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1
aliases CVE-2017-3140
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4dn-73sn-57c1
6
url VCID-tp19-8gsn-n7ez
vulnerability_id VCID-tp19-8gsn-n7ez
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3136.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3136.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3136
reference_id
reference_type
scores
0
value 0.48516
scoring_system epss
scoring_elements 0.97757
published_at 2026-04-24T12:55:00Z
1
value 0.48516
scoring_system epss
scoring_elements 0.97755
published_at 2026-04-16T12:55:00Z
2
value 0.48516
scoring_system epss
scoring_elements 0.97758
published_at 2026-04-18T12:55:00Z
3
value 0.49378
scoring_system epss
scoring_elements 0.97767
published_at 2026-04-01T12:55:00Z
4
value 0.49378
scoring_system epss
scoring_elements 0.97788
published_at 2026-04-12T12:55:00Z
5
value 0.49378
scoring_system epss
scoring_elements 0.97789
published_at 2026-04-13T12:55:00Z
6
value 0.49378
scoring_system epss
scoring_elements 0.97772
published_at 2026-04-02T12:55:00Z
7
value 0.49378
scoring_system epss
scoring_elements 0.97774
published_at 2026-04-04T12:55:00Z
8
value 0.49378
scoring_system epss
scoring_elements 0.97776
published_at 2026-04-07T12:55:00Z
9
value 0.49378
scoring_system epss
scoring_elements 0.9778
published_at 2026-04-08T12:55:00Z
10
value 0.49378
scoring_system epss
scoring_elements 0.97783
published_at 2026-04-09T12:55:00Z
11
value 0.49378
scoring_system epss
scoring_elements 0.97786
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3136
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
9
reference_url https://kb.isc.org/docs/aa-01465
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01465
10
reference_url https://security.netapp.com/advisory/ntap-20180802-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180802-0002/
11
reference_url https://www.debian.org/security/2017/dsa-3854
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3854
12
reference_url http://www.securityfocus.com/bid/97653
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97653
13
reference_url http://www.securitytracker.com/id/1038259
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038259
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1441125
reference_id 1441125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1441125
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860224
reference_id 860224
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860224
16
reference_url https://security.archlinux.org/ASA-201704-11
reference_id ASA-201704-11
reference_type
scores
url https://security.archlinux.org/ASA-201704-11
17
reference_url https://security.archlinux.org/AVG-239
reference_id AVG-239
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-239
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p5:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p5:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p6:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:b1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:rc1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p2:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p3:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:beta1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:rc1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p2:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p3:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p4:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p5:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:p5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p5:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p6:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.0:p6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:p6:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:rc1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3136
reference_id CVE-2017-3136
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3136
64
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
65
reference_url https://access.redhat.com/errata/RHSA-2017:1095
reference_id RHSA-2017:1095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1095
66
reference_url https://access.redhat.com/errata/RHSA-2017:1105
reference_id RHSA-2017:1105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1105
67
reference_url https://usn.ubuntu.com/3259-1/
reference_id USN-3259-1
reference_type
scores
url https://usn.ubuntu.com/3259-1/
fixed_packages
0
url pkg:ebuild/net-dns/bind@9.11.1_p1
purl pkg:ebuild/net-dns/bind@9.11.1_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1
aliases CVE-2017-3136
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tp19-8gsn-n7ez
7
url VCID-uze1-hja3-kubc
vulnerability_id VCID-uze1-hja3-kubc
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9131.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9131
reference_id
reference_type
scores
0
value 0.7283
scoring_system epss
scoring_elements 0.98764
published_at 2026-04-01T12:55:00Z
1
value 0.7283
scoring_system epss
scoring_elements 0.98784
published_at 2026-04-24T12:55:00Z
2
value 0.7283
scoring_system epss
scoring_elements 0.98779
published_at 2026-04-18T12:55:00Z
3
value 0.7283
scoring_system epss
scoring_elements 0.98781
published_at 2026-04-21T12:55:00Z
4
value 0.7283
scoring_system epss
scoring_elements 0.98765
published_at 2026-04-02T12:55:00Z
5
value 0.7283
scoring_system epss
scoring_elements 0.98768
published_at 2026-04-04T12:55:00Z
6
value 0.7283
scoring_system epss
scoring_elements 0.9877
published_at 2026-04-07T12:55:00Z
7
value 0.7283
scoring_system epss
scoring_elements 0.98771
published_at 2026-04-09T12:55:00Z
8
value 0.7283
scoring_system epss
scoring_elements 0.98773
published_at 2026-04-11T12:55:00Z
9
value 0.7283
scoring_system epss
scoring_elements 0.98774
published_at 2026-04-12T12:55:00Z
10
value 0.7283
scoring_system epss
scoring_elements 0.98775
published_at 2026-04-13T12:55:00Z
11
value 0.7283
scoring_system epss
scoring_elements 0.98778
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9131
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411348
reference_id 1411348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411348
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851065
reference_id 851065
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851065
8
reference_url https://security.archlinux.org/ASA-201701-15
reference_id ASA-201701-15
reference_type
scores
url https://security.archlinux.org/ASA-201701-15
9
reference_url https://security.archlinux.org/AVG-132
reference_id AVG-132
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-132
10
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
11
reference_url https://access.redhat.com/errata/RHSA-2017:0062
reference_id RHSA-2017:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0062
12
reference_url https://access.redhat.com/errata/RHSA-2017:1583
reference_id RHSA-2017:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1583
13
reference_url https://usn.ubuntu.com/3172-1/
reference_id USN-3172-1
reference_type
scores
url https://usn.ubuntu.com/3172-1/
fixed_packages
0
url pkg:ebuild/net-dns/bind@9.11.1_p1
purl pkg:ebuild/net-dns/bind@9.11.1_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1
aliases CVE-2016-9131
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uze1-hja3-kubc
8
url VCID-wpmu-g3xw-u7cs
vulnerability_id VCID-wpmu-g3xw-u7cs
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3141.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3141
reference_id
reference_type
scores
0
value 0.03103
scoring_system epss
scoring_elements 0.86747
published_at 2026-04-01T12:55:00Z
1
value 0.03103
scoring_system epss
scoring_elements 0.86843
published_at 2026-04-24T12:55:00Z
2
value 0.03103
scoring_system epss
scoring_elements 0.86824
published_at 2026-04-16T12:55:00Z
3
value 0.03103
scoring_system epss
scoring_elements 0.86828
published_at 2026-04-18T12:55:00Z
4
value 0.03103
scoring_system epss
scoring_elements 0.86827
published_at 2026-04-21T12:55:00Z
5
value 0.03103
scoring_system epss
scoring_elements 0.86758
published_at 2026-04-02T12:55:00Z
6
value 0.03103
scoring_system epss
scoring_elements 0.86777
published_at 2026-04-04T12:55:00Z
7
value 0.03103
scoring_system epss
scoring_elements 0.86775
published_at 2026-04-07T12:55:00Z
8
value 0.03103
scoring_system epss
scoring_elements 0.86794
published_at 2026-04-08T12:55:00Z
9
value 0.03103
scoring_system epss
scoring_elements 0.86803
published_at 2026-04-09T12:55:00Z
10
value 0.03103
scoring_system epss
scoring_elements 0.86816
published_at 2026-04-11T12:55:00Z
11
value 0.03103
scoring_system epss
scoring_elements 0.86813
published_at 2026-04-12T12:55:00Z
12
value 0.03103
scoring_system epss
scoring_elements 0.86808
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3141
2
reference_url https://kb.isc.org/docs/aa-01496
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01496
3
reference_url https://security.netapp.com/advisory/ntap-20180926-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0001/
4
reference_url https://www.exploit-db.com/exploits/42121/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/42121/
5
reference_url http://www.securityfocus.com/bid/99089
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99089
6
reference_url http://www.securitytracker.com/id/1038693
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038693
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461310
reference_id 1461310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461310
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.6:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:p2:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.3.2:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:p1:*:*:*:*:*:*
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42121.txt
reference_id CVE-2017-3141
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42121.txt
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3141
reference_id CVE-2017-3141
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
2
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3141
13
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
fixed_packages
0
url pkg:ebuild/net-dns/bind@9.11.1_p1
purl pkg:ebuild/net-dns/bind@9.11.1_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1
aliases CVE-2017-3141
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpmu-g3xw-u7cs
9
url VCID-xatr-hnmn-mfbj
vulnerability_id VCID-xatr-hnmn-mfbj
summary
Multiple vulnerabilities have been found in BIND, the worst of
    which allows remote attackers to cause a Denial of Service condition.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2017-0276.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0276.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3135.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3135.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3135
reference_id
reference_type
scores
0
value 0.34413
scoring_system epss
scoring_elements 0.96961
published_at 2026-04-01T12:55:00Z
1
value 0.34413
scoring_system epss
scoring_elements 0.97006
published_at 2026-04-24T12:55:00Z
2
value 0.34413
scoring_system epss
scoring_elements 0.96988
published_at 2026-04-11T12:55:00Z
3
value 0.34413
scoring_system epss
scoring_elements 0.96989
published_at 2026-04-12T12:55:00Z
4
value 0.34413
scoring_system epss
scoring_elements 0.9699
published_at 2026-04-13T12:55:00Z
5
value 0.34413
scoring_system epss
scoring_elements 0.96999
published_at 2026-04-16T12:55:00Z
6
value 0.34413
scoring_system epss
scoring_elements 0.97002
published_at 2026-04-18T12:55:00Z
7
value 0.34413
scoring_system epss
scoring_elements 0.97005
published_at 2026-04-21T12:55:00Z
8
value 0.34413
scoring_system epss
scoring_elements 0.96969
published_at 2026-04-02T12:55:00Z
9
value 0.34413
scoring_system epss
scoring_elements 0.96974
published_at 2026-04-04T12:55:00Z
10
value 0.34413
scoring_system epss
scoring_elements 0.96976
published_at 2026-04-07T12:55:00Z
11
value 0.34413
scoring_system epss
scoring_elements 0.96985
published_at 2026-04-08T12:55:00Z
12
value 0.34413
scoring_system epss
scoring_elements 0.96986
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3135
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
6
reference_url https://kb.isc.org/docs/aa-01453
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01453
7
reference_url https://security.netapp.com/advisory/ntap-20180926-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0005/
8
reference_url https://www.debian.org/security/2017/dsa-3795
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3795
9
reference_url http://www.securityfocus.com/bid/96150
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/96150
10
reference_url http://www.securitytracker.com/id/1037801
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037801
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1420193
reference_id 1420193
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1420193
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855520
reference_id 855520
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855520
13
reference_url https://security.archlinux.org/ASA-201702-8
reference_id ASA-201702-8
reference_type
scores
url https://security.archlinux.org/ASA-201702-8
14
reference_url https://security.archlinux.org/AVG-169
reference_id AVG-169
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-169
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p5:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.4:p5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.4:p5:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:beta1:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.0:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p2:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.11.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.1:beta1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p5:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:p5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:p5:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s7:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.9.9:s7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s7:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3135
reference_id CVE-2017-3135
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3135
49
reference_url https://security.gentoo.org/glsa/201708-01
reference_id GLSA-201708-01
reference_type
scores
url https://security.gentoo.org/glsa/201708-01
50
reference_url https://access.redhat.com/errata/RHSA-2017:0276
reference_id RHSA-2017:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0276
51
reference_url https://usn.ubuntu.com/3201-1/
reference_id USN-3201-1
reference_type
scores
url https://usn.ubuntu.com/3201-1/
fixed_packages
0
url pkg:ebuild/net-dns/bind@9.11.1_p1
purl pkg:ebuild/net-dns/bind@9.11.1_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1
aliases CVE-2017-3135
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xatr-hnmn-mfbj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.11.1_p1