Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-7w4b-sk4v-3bd8
Summary
A memory exhaustion vulnerability in ISC DHCP could lead to Denial
    of Service.
Aliases
0
alias CVE-2013-2494
Fixed_packages
0
url pkg:deb/debian/isc-dhcp@4.2.4-6?distro=trixie
purl pkg:deb/debian/isc-dhcp@4.2.4-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.4-6%3Fdistro=trixie
1
url pkg:deb/debian/isc-dhcp@4.3.1-6
purl pkg:deb/debian/isc-dhcp@4.3.1-6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nnm-zxf3-3bhd
1
vulnerability VCID-3qwn-cc1f-8bht
2
vulnerability VCID-5e1d-48v5-7kfy
3
vulnerability VCID-hubm-k681-pkb1
4
vulnerability VCID-n362-tq55-tkha
5
vulnerability VCID-nyv5-m9g6-kqb3
6
vulnerability VCID-vwd3-4x2n-ckfv
7
vulnerability VCID-yf9w-gpqd-2yga
8
vulnerability VCID-zkkh-dw89-23gg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6
2
url pkg:deb/debian/isc-dhcp@4.4.1-2.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/isc-dhcp@4.4.1-2.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2.3%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/isc-dhcp@4.4.3-P1-2?distro=trixie
purl pkg:deb/debian/isc-dhcp@4.4.3-P1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.3-P1-2%3Fdistro=trixie
4
url pkg:deb/debian/isc-dhcp@4.4.3-P1-8?distro=trixie
purl pkg:deb/debian/isc-dhcp@4.4.3-P1-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.3-P1-8%3Fdistro=trixie
5
url pkg:ebuild/net-misc/dhcp@4.2.5_p1
purl pkg:ebuild/net-misc/dhcp@4.2.5_p1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.5_p1
Affected_packages
0
url pkg:deb/debian/isc-dhcp@4.1.1-P1-15%2Bsqueeze8
purl pkg:deb/debian/isc-dhcp@4.1.1-P1-15%2Bsqueeze8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nnm-zxf3-3bhd
1
vulnerability VCID-1uby-b9re-hqg2
2
vulnerability VCID-3qwn-cc1f-8bht
3
vulnerability VCID-5e1d-48v5-7kfy
4
vulnerability VCID-5v14-pk3f-7ye1
5
vulnerability VCID-6n54-npev-97ep
6
vulnerability VCID-7w4b-sk4v-3bd8
7
vulnerability VCID-b2gd-p3qx-37eh
8
vulnerability VCID-e4yf-gnwv-4bap
9
vulnerability VCID-g3ma-agz7-eka4
10
vulnerability VCID-hjry-zy32-vfcp
11
vulnerability VCID-hubm-k681-pkb1
12
vulnerability VCID-m3fx-k6et-ykg3
13
vulnerability VCID-n362-tq55-tkha
14
vulnerability VCID-nyv5-m9g6-kqb3
15
vulnerability VCID-qg1j-mnkq-s3b1
16
vulnerability VCID-rm9p-arpx-6qdu
17
vulnerability VCID-vwd3-4x2n-ckfv
18
vulnerability VCID-wc57-hq32-vfgn
19
vulnerability VCID-yf9w-gpqd-2yga
20
vulnerability VCID-zkkh-dw89-23gg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.1.1-P1-15%252Bsqueeze8
1
url pkg:deb/debian/isc-dhcp@4.1.1-P1-15%2Bsqueeze10
purl pkg:deb/debian/isc-dhcp@4.1.1-P1-15%2Bsqueeze10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nnm-zxf3-3bhd
1
vulnerability VCID-1uby-b9re-hqg2
2
vulnerability VCID-3qwn-cc1f-8bht
3
vulnerability VCID-5e1d-48v5-7kfy
4
vulnerability VCID-5v14-pk3f-7ye1
5
vulnerability VCID-6n54-npev-97ep
6
vulnerability VCID-7w4b-sk4v-3bd8
7
vulnerability VCID-b2gd-p3qx-37eh
8
vulnerability VCID-e4yf-gnwv-4bap
9
vulnerability VCID-g3ma-agz7-eka4
10
vulnerability VCID-hjry-zy32-vfcp
11
vulnerability VCID-hubm-k681-pkb1
12
vulnerability VCID-m3fx-k6et-ykg3
13
vulnerability VCID-n362-tq55-tkha
14
vulnerability VCID-nyv5-m9g6-kqb3
15
vulnerability VCID-qg1j-mnkq-s3b1
16
vulnerability VCID-rm9p-arpx-6qdu
17
vulnerability VCID-vwd3-4x2n-ckfv
18
vulnerability VCID-wc57-hq32-vfgn
19
vulnerability VCID-yf9w-gpqd-2yga
20
vulnerability VCID-zkkh-dw89-23gg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.1.1-P1-15%252Bsqueeze10
2
url pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%2Bdeb70u8
purl pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%2Bdeb70u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nnm-zxf3-3bhd
1
vulnerability VCID-3qwn-cc1f-8bht
2
vulnerability VCID-5e1d-48v5-7kfy
3
vulnerability VCID-6n54-npev-97ep
4
vulnerability VCID-7w4b-sk4v-3bd8
5
vulnerability VCID-b2gd-p3qx-37eh
6
vulnerability VCID-g3ma-agz7-eka4
7
vulnerability VCID-hubm-k681-pkb1
8
vulnerability VCID-n362-tq55-tkha
9
vulnerability VCID-nyv5-m9g6-kqb3
10
vulnerability VCID-rm9p-arpx-6qdu
11
vulnerability VCID-vwd3-4x2n-ckfv
12
vulnerability VCID-wc57-hq32-vfgn
13
vulnerability VCID-yf9w-gpqd-2yga
14
vulnerability VCID-zkkh-dw89-23gg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%252Bdeb70u8
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2494.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2494
reference_id
reference_type
scores
0
value 0.01036
scoring_system epss
scoring_elements 0.77451
published_at 2026-04-24T12:55:00Z
1
value 0.01036
scoring_system epss
scoring_elements 0.77328
published_at 2026-04-01T12:55:00Z
2
value 0.01036
scoring_system epss
scoring_elements 0.77334
published_at 2026-04-02T12:55:00Z
3
value 0.01036
scoring_system epss
scoring_elements 0.77363
published_at 2026-04-04T12:55:00Z
4
value 0.01036
scoring_system epss
scoring_elements 0.77343
published_at 2026-04-07T12:55:00Z
5
value 0.01036
scoring_system epss
scoring_elements 0.77373
published_at 2026-04-08T12:55:00Z
6
value 0.01036
scoring_system epss
scoring_elements 0.77383
published_at 2026-04-09T12:55:00Z
7
value 0.01036
scoring_system epss
scoring_elements 0.77409
published_at 2026-04-11T12:55:00Z
8
value 0.01036
scoring_system epss
scoring_elements 0.77389
published_at 2026-04-12T12:55:00Z
9
value 0.01036
scoring_system epss
scoring_elements 0.77386
published_at 2026-04-13T12:55:00Z
10
value 0.01036
scoring_system epss
scoring_elements 0.77426
published_at 2026-04-16T12:55:00Z
11
value 0.01036
scoring_system epss
scoring_elements 0.77425
published_at 2026-04-18T12:55:00Z
12
value 0.01036
scoring_system epss
scoring_elements 0.77417
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2494
3
reference_url https://kb.isc.org/article/AA-00880/
reference_id
reference_type
scores
url https://kb.isc.org/article/AA-00880/
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704426
reference_id 704426
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704426
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=928011
reference_id 928011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=928011
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:dhcp:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2494
reference_id CVE-2013-2494
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-2494
26
reference_url https://security.gentoo.org/glsa/201401-05
reference_id GLSA-201401-05
reference_type
scores
url https://security.gentoo.org/glsa/201401-05
Weaknesses
0
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
Severity_range_score4.9 - 4.9
Exploitability0.5
Weighted_severity4.4
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-7w4b-sk4v-3bd8