Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-b3u2-wjzm-duhc
Summarybind: When chasing DS records, a timed-out or artificially delayed fetch could cause 'named' to crash while resuming a DS lookup
Aliases
0
alias CVE-2022-0667
Fixed_packages
0
url pkg:alpm/archlinux/bind@9.18.1-1
purl pkg:alpm/archlinux/bind@9.18.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.18.1-1
1
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.18.1-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.1-1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
7
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
Affected_packages
0
url pkg:alpm/archlinux/bind@9.18.0-1
purl pkg:alpm/archlinux/bind@9.18.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-67zf-a3r9-wqcv
1
vulnerability VCID-b3u2-wjzm-duhc
2
vulnerability VCID-x4bu-4ex7-37cd
3
vulnerability VCID-zgnn-ckqt-43fq
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.18.0-1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0667.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0667
reference_id
reference_type
scores
0
value 0.00694
scoring_system epss
scoring_elements 0.71825
published_at 2026-04-01T12:55:00Z
1
value 0.00694
scoring_system epss
scoring_elements 0.71866
published_at 2026-04-13T12:55:00Z
2
value 0.00694
scoring_system epss
scoring_elements 0.71901
published_at 2026-04-11T12:55:00Z
3
value 0.00694
scoring_system epss
scoring_elements 0.71883
published_at 2026-04-12T12:55:00Z
4
value 0.00694
scoring_system epss
scoring_elements 0.71834
published_at 2026-04-02T12:55:00Z
5
value 0.00694
scoring_system epss
scoring_elements 0.71853
published_at 2026-04-04T12:55:00Z
6
value 0.00694
scoring_system epss
scoring_elements 0.71827
published_at 2026-04-07T12:55:00Z
7
value 0.00694
scoring_system epss
scoring_elements 0.71865
published_at 2026-04-08T12:55:00Z
8
value 0.00694
scoring_system epss
scoring_elements 0.71877
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0667
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064515
reference_id 2064515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064515
4
reference_url https://security.archlinux.org/ASA-202204-5
reference_id ASA-202204-5
reference_type
scores
url https://security.archlinux.org/ASA-202204-5
5
reference_url https://security.archlinux.org/AVG-2661
reference_id AVG-2661
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2661
Weaknesses
0
cwe_id 617
name Reachable Assertion
description The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-b3u2-wjzm-duhc