Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-2r8j-u91u-p7gb
Summary
Multiple vulnerabilities have been found in BIND, the worst of
    which may allow remote Denial of Service.
Aliases
0
alias CVE-2012-3868
Fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
6
url pkg:deb/debian/isc-dhcp@0?distro=trixie
purl pkg:deb/debian/isc-dhcp@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@0%3Fdistro=trixie
7
url pkg:deb/debian/isc-dhcp@4.4.1-2.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/isc-dhcp@4.4.1-2.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2.3%252Bdeb11u2%3Fdistro=trixie
8
url pkg:deb/debian/isc-dhcp@4.4.3-P1-2?distro=trixie
purl pkg:deb/debian/isc-dhcp@4.4.3-P1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.3-P1-2%3Fdistro=trixie
9
url pkg:deb/debian/isc-dhcp@4.4.3-P1-8?distro=trixie
purl pkg:deb/debian/isc-dhcp@4.4.3-P1-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.3-P1-8%3Fdistro=trixie
10
url pkg:ebuild/net-dns/bind@9.9.1_p3
purl pkg:ebuild/net-dns/bind@9.9.1_p3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.9.1_p3
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3868.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3868
reference_id
reference_type
scores
0
value 0.01972
scoring_system epss
scoring_elements 0.8348
published_at 2026-04-01T12:55:00Z
1
value 0.01972
scoring_system epss
scoring_elements 0.83492
published_at 2026-04-02T12:55:00Z
2
value 0.01972
scoring_system epss
scoring_elements 0.83507
published_at 2026-04-04T12:55:00Z
3
value 0.01972
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-07T12:55:00Z
4
value 0.01972
scoring_system epss
scoring_elements 0.83532
published_at 2026-04-08T12:55:00Z
5
value 0.01972
scoring_system epss
scoring_elements 0.83541
published_at 2026-04-09T12:55:00Z
6
value 0.01972
scoring_system epss
scoring_elements 0.83556
published_at 2026-04-11T12:55:00Z
7
value 0.01972
scoring_system epss
scoring_elements 0.8355
published_at 2026-04-12T12:55:00Z
8
value 0.01972
scoring_system epss
scoring_elements 0.83546
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3868
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=842895
reference_id 842895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=842895
3
reference_url https://security.gentoo.org/glsa/201209-04
reference_id GLSA-201209-04
reference_type
scores
url https://security.gentoo.org/glsa/201209-04
Weaknesses
0
cwe_id 401
name Missing Release of Memory after Effective Lifetime
description The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Exploits
Severity_range_scorenull
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-2r8j-u91u-p7gb