Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-qwqh-w83m-2kff
SummaryBIND: DoS (infinite loop of RRSIGs queries to authoritative servers) via certain RRSIG query
Aliases
0
alias CVE-2010-0213
Fixed_packages
0
url pkg:deb/debian/bind9@9.7.1.dfsg.P2?distro=trixie
purl pkg:deb/debian/bind9@9.7.1.dfsg.P2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@9.7.1.dfsg.P2%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
Affected_packages
References
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044445.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044445.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0213.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0213.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0213
reference_id
reference_type
scores
0
value 0.0097
scoring_system epss
scoring_elements 0.76668
published_at 2026-04-18T12:55:00Z
1
value 0.0097
scoring_system epss
scoring_elements 0.76569
published_at 2026-04-01T12:55:00Z
2
value 0.0097
scoring_system epss
scoring_elements 0.76573
published_at 2026-04-02T12:55:00Z
3
value 0.0097
scoring_system epss
scoring_elements 0.76602
published_at 2026-04-04T12:55:00Z
4
value 0.0097
scoring_system epss
scoring_elements 0.76583
published_at 2026-04-07T12:55:00Z
5
value 0.0097
scoring_system epss
scoring_elements 0.76615
published_at 2026-04-08T12:55:00Z
6
value 0.0097
scoring_system epss
scoring_elements 0.76626
published_at 2026-04-09T12:55:00Z
7
value 0.0097
scoring_system epss
scoring_elements 0.76652
published_at 2026-04-11T12:55:00Z
8
value 0.0097
scoring_system epss
scoring_elements 0.76632
published_at 2026-04-12T12:55:00Z
9
value 0.0097
scoring_system epss
scoring_elements 0.76623
published_at 2026-04-13T12:55:00Z
10
value 0.0097
scoring_system epss
scoring_elements 0.76664
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0213
5
reference_url http://secunia.com/advisories/40652
reference_id
reference_type
scores
url http://secunia.com/advisories/40652
6
reference_url http://secunia.com/advisories/40709
reference_id
reference_type
scores
url http://secunia.com/advisories/40709
7
reference_url http://www.isc.org/software/bind/advisories/cve-2010-0213
reference_id
reference_type
scores
url http://www.isc.org/software/bind/advisories/cve-2010-0213
8
reference_url http://www.kb.cert.org/vuls/id/211905
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/211905
9
reference_url http://www.securityfocus.com/bid/41730
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/41730
10
reference_url http://www.securitytracker.com/id?1024217
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024217
11
reference_url http://www.vupen.com/english/advisories/2010/1884
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1884
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=616706
reference_id 616706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=616706
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-0213
reference_id CVE-2010-0213
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-0213
Weaknesses
0
cwe_id 835
name Loop with Unreachable Exit Condition ('Infinite Loop')
description The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
1
cwe_id 19
name Data Processing Errors
description Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Exploits
Severity_range_score2.6 - 2.6
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-qwqh-w83m-2kff