Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-7565-6bvk-mqgx
Summary
DNS Rebinding in etcd
DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address).
Aliases
0
alias CVE-2018-1099
1
alias GHSA-wf43-55jj-vwq8
Fixed_packages
0
url pkg:deb/debian/etcd@3.4.23-1?distro=trixie
purl pkg:deb/debian/etcd@3.4.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.4.23-1%3Fdistro=trixie
1
url pkg:deb/debian/etcd@3.4.23-4
purl pkg:deb/debian/etcd@3.4.23-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-my73-sc8s-3faj
1
vulnerability VCID-pb9m-ts3k-uban
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.4.23-4
2
url pkg:deb/debian/etcd@3.4.23-4?distro=trixie
purl pkg:deb/debian/etcd@3.4.23-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-my73-sc8s-3faj
1
vulnerability VCID-pb9m-ts3k-uban
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.4.23-4%3Fdistro=trixie
3
url pkg:deb/debian/etcd@3.5.16-4?distro=trixie
purl pkg:deb/debian/etcd@3.5.16-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.5.16-4%3Fdistro=trixie
4
url pkg:deb/debian/etcd@3.5.16-10?distro=trixie
purl pkg:deb/debian/etcd@3.5.16-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.5.16-10%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/etcd@3.3.25%2Bdfsg-6
purl pkg:deb/debian/etcd@3.3.25%2Bdfsg-6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7565-6bvk-mqgx
1
vulnerability VCID-my73-sc8s-3faj
2
vulnerability VCID-pb9m-ts3k-uban
3
vulnerability VCID-ud4m-y2s3-nban
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.3.25%252Bdfsg-6
1
url pkg:deb/debian/etcd@3.3.25%2Bdfsg-6?distro=trixie
purl pkg:deb/debian/etcd@3.3.25%2Bdfsg-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7565-6bvk-mqgx
1
vulnerability VCID-my73-sc8s-3faj
2
vulnerability VCID-pb9m-ts3k-uban
3
vulnerability VCID-ud4m-y2s3-nban
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.3.25%252Bdfsg-6%3Fdistro=trixie
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1099.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1099.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1099
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.2073
published_at 2026-04-21T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20777
published_at 2026-04-01T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20929
published_at 2026-04-02T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20987
published_at 2026-04-04T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20701
published_at 2026-04-07T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20778
published_at 2026-04-08T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20839
published_at 2026-04-09T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20856
published_at 2026-04-11T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20812
published_at 2026-04-12T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.2076
published_at 2026-04-13T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20751
published_at 2026-04-16T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20743
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1099
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1552717
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1552717
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1099
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56
6
reference_url https://github.com/coreos/etcd/issues/9353
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/etcd/issues/9353
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1099
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1099
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921156
reference_id 921156
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921156
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 350
name Reliance on Reverse DNS Resolution for a Security-Critical Action
description The product performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it does not properly ensure that the IP address is truly associated with the hostname.
2
cwe_id 284
name Improper Access Control
description The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Exploits
Severity_range_score3.7 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-7565-6bvk-mqgx