{"url":"http://public2.vulnerablecode.io/api/packages/572024?format=json","purl":"pkg:deb/debian/isc-dhcp@4.1.1-P1-15%2Bsqueeze8","type":"deb","namespace":"debian","name":"isc-dhcp","version":"4.1.1-P1-15+squeeze8","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"4.4.1-2.3+deb11u2","latest_non_vulnerable_version":"4.4.1-2.3+deb11u2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61912?format=json","vulnerability_id":"VCID-1nnm-zxf3-3bhd","summary":"Multiple vulnerabilities have been discovered in ISC DHCP, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2928.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2928.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2928","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14958","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14961","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14904","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15043","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15095","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15062","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15023","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14859","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14866","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22721","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22765","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22555","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021320","reference_id":"1021320","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021320"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2132002","reference_id":"2132002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2132002"},{"reference_url":"https://security.gentoo.org/glsa/202305-22","reference_id":"GLSA-202305-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2502","reference_id":"RHSA-2023:2502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3000","reference_id":"RHSA-2023:3000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3000"},{"reference_url":"https://usn.ubuntu.com/5658-1/","reference_id":"USN-5658-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5658-1/"},{"reference_url":"https://usn.ubuntu.com/5658-2/","reference_id":"USN-5658-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5658-2/"},{"reference_url":"https://usn.ubuntu.com/5658-3/","reference_id":"USN-5658-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5658-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049943?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.1-2.3%2Bdeb11u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2.3%252Bdeb11u2"}],"aliases":["CVE-2022-2928"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1nnm-zxf3-3bhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35812?format=json","vulnerability_id":"VCID-1uby-b9re-hqg2","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4539.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4539","reference_id":"","reference_type":"","scores":[{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96279","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96287","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96309","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96311","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96316","published_at":"2026-04-11T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96315","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96318","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96332","published_at":"2026-04-18T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96333","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.32265","scoring_system":"epss","scoring_elements":"0.96853","published_at":"2026-04-29T12:55:00Z"},{"value":"0.32265","scoring_system":"epss","scoring_elements":"0.96859","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652259","reference_id":"652259","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652259"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=761265","reference_id":"761265","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=761265"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1819","reference_id":"RHSA-2011:1819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1819"},{"reference_url":"https://usn.ubuntu.com/1309-1/","reference_id":"USN-1309-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1309-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572026?format=json","purl":"pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%2Bdeb70u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-6n54-npev-97ep"},{"vulnerability":"VCID-7w4b-sk4v-3bd8"},{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-g3ma-agz7-eka4"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-rm9p-arpx-6qdu"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-wc57-hq32-vfgn"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%252Bdeb70u8"}],"aliases":["CVE-2011-4539"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1uby-b9re-hqg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50135?format=json","vulnerability_id":"VCID-3qwn-cc1f-8bht","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which could allow for the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5732.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5732.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5732","reference_id":"","reference_type":"","scores":[{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83905","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83873","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83899","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03639","scoring_system":"epss","scoring_elements":"0.87855","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03639","scoring_system":"epss","scoring_elements":"0.87877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03639","scoring_system":"epss","scoring_elements":"0.87886","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03639","scoring_system":"epss","scoring_elements":"0.87846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03639","scoring_system":"epss","scoring_elements":"0.87859","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03639","scoring_system":"epss","scoring_elements":"0.87858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03639","scoring_system":"epss","scoring_elements":"0.87871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03639","scoring_system":"epss","scoring_elements":"0.87874","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kb.isc.org/docs/aa-01565","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/aa-01565"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1549960","reference_id":"1549960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1549960"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891786","reference_id":"891786","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891786"},{"reference_url":"https://security.archlinux.org/ASA-201803-3","reference_id":"ASA-201803-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-3"},{"reference_url":"https://security.archlinux.org/AVG-648","reference_id":"AVG-648","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-648"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12-p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12-p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12-p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r13b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r14b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5732","reference_id":"CVE-2018-5732","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5732"},{"reference_url":"https://security.gentoo.org/glsa/201804-05","reference_id":"GLSA-201804-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0469","reference_id":"RHSA-2018:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0483","reference_id":"RHSA-2018:0483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0483"},{"reference_url":"https://usn.ubuntu.com/3586-1/","reference_id":"USN-3586-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3586-1/"},{"reference_url":"https://usn.ubuntu.com/3586-2/","reference_id":"USN-3586-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3586-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035590?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1036939?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.5-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.5-3%252Bdeb9u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1049942?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.1-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2%252Bdeb10u1"}],"aliases":["CVE-2018-5732"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qwn-cc1f-8bht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61911?format=json","vulnerability_id":"VCID-5e1d-48v5-7kfy","summary":"Multiple vulnerabilities have been discovered in ISC DHCP, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25217.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25217.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25217","reference_id":"","reference_type":"","scores":[{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53216","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53224","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53231","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53213","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53199","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53173","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53201","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54384","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65481","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65445","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65405","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25217"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25217"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1963258","reference_id":"1963258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1963258"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989157","reference_id":"989157","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989157"},{"reference_url":"https://security.archlinux.org/ASA-202106-10","reference_id":"ASA-202106-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-10"},{"reference_url":"https://security.archlinux.org/ASA-202106-11","reference_id":"ASA-202106-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-11"},{"reference_url":"https://security.archlinux.org/AVG-2004","reference_id":"AVG-2004","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2004"},{"reference_url":"https://security.gentoo.org/glsa/202305-22","reference_id":"GLSA-202305-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2357","reference_id":"RHSA-2021:2357","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2357"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2359","reference_id":"RHSA-2021:2359","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2359"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2405","reference_id":"RHSA-2021:2405","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2405"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2414","reference_id":"RHSA-2021:2414","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2415","reference_id":"RHSA-2021:2415","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2415"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2416","reference_id":"RHSA-2021:2416","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2416"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2418","reference_id":"RHSA-2021:2418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2419","reference_id":"RHSA-2021:2419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2420","reference_id":"RHSA-2021:2420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2469","reference_id":"RHSA-2021:2469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2519","reference_id":"RHSA-2021:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2555","reference_id":"RHSA-2021:2555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2555"},{"reference_url":"https://usn.ubuntu.com/4969-1/","reference_id":"USN-4969-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4969-1/"},{"reference_url":"https://usn.ubuntu.com/4969-2/","reference_id":"USN-4969-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4969-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049943?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.1-2.3%2Bdeb11u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2.3%252Bdeb11u2"}],"aliases":["CVE-2021-25217"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5e1d-48v5-7kfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35813?format=json","vulnerability_id":"VCID-5v14-pk3f-7ye1","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4868.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4868","reference_id":"","reference_type":"","scores":[{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74767","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.7477","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74797","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74771","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74804","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74855","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74845","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74888","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74892","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74898","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655746","reference_id":"655746","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655746"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=781242","reference_id":"781242","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=781242"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572026?format=json","purl":"pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%2Bdeb70u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-6n54-npev-97ep"},{"vulnerability":"VCID-7w4b-sk4v-3bd8"},{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-g3ma-agz7-eka4"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-rm9p-arpx-6qdu"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-wc57-hq32-vfgn"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%252Bdeb70u8"}],"aliases":["CVE-2011-4868"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5v14-pk3f-7ye1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92331?format=json","vulnerability_id":"VCID-6n54-npev-97ep","summary":"An issue was discovered in dhclient 4.3.1-6 due to an embedded path variable.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2248","reference_id":"","reference_type":"","scores":[{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85102","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85114","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85132","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85136","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85158","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.8518","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85178","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85196","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85197","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85219","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85228","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.85226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0244","scoring_system":"epss","scoring_elements":"0.8524","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2248"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690532","reference_id":"690532","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690532"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035589?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6"}],"aliases":["CVE-2012-2248"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6n54-npev-97ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57218?format=json","vulnerability_id":"VCID-7w4b-sk4v-3bd8","summary":"A memory exhaustion vulnerability in ISC DHCP could lead to Denial\n    of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2494.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2494","reference_id":"","reference_type":"","scores":[{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77328","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77363","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77373","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77383","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77409","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77389","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77426","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77425","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77417","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77458","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.7747","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2494"},{"reference_url":"https://kb.isc.org/article/AA-00880/","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-00880/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704426","reference_id":"704426","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704426"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=928011","reference_id":"928011","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=928011"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2494","reference_id":"CVE-2013-2494","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2494"},{"reference_url":"https://security.gentoo.org/glsa/201401-05","reference_id":"GLSA-201401-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035589?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6"}],"aliases":["CVE-2013-2494"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7w4b-sk4v-3bd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35819?format=json","vulnerability_id":"VCID-b2gd-p3qx-37eh","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3954.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3954","reference_id":"","reference_type":"","scores":[{"value":"0.0446","scoring_system":"epss","scoring_elements":"0.89125","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9061","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9056","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90633","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90635","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9063","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90605","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174","reference_id":"686174","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=842428","reference_id":"842428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=842428"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1141","reference_id":"RHSA-2012:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1141"},{"reference_url":"https://usn.ubuntu.com/1519-1/","reference_id":"USN-1519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035589?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6"}],"aliases":["CVE-2012-3954"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2gd-p3qx-37eh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87522?format=json","vulnerability_id":"VCID-e4yf-gnwv-4bap","summary":"dhcp: unexpected abort caused by a DHCPv6 decline message","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053644.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053644.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0413.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0413.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0413","reference_id":"","reference_type":"","scores":[{"value":"0.08607","scoring_system":"epss","scoring_elements":"0.9245","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08607","scoring_system":"epss","scoring_elements":"0.92444","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08607","scoring_system":"epss","scoring_elements":"0.92439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11249","scoring_system":"epss","scoring_elements":"0.93502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11249","scoring_system":"epss","scoring_elements":"0.93505","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11249","scoring_system":"epss","scoring_elements":"0.9351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11249","scoring_system":"epss","scoring_elements":"0.93478","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11249","scoring_system":"epss","scoring_elements":"0.93535","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11249","scoring_system":"epss","scoring_elements":"0.93542","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11249","scoring_system":"epss","scoring_elements":"0.93546","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11249","scoring_system":"epss","scoring_elements":"0.93529","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11249","scoring_system":"epss","scoring_elements":"0.93487","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11249","scoring_system":"epss","scoring_elements":"0.93494","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0413"},{"reference_url":"http://secunia.com/advisories/43006","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43006"},{"reference_url":"http://secunia.com/advisories/43104","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43104"},{"reference_url":"http://secunia.com/advisories/43167","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43167"},{"reference_url":"http://secunia.com/advisories/43354","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43354"},{"reference_url":"http://secunia.com/advisories/43613","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43613"},{"reference_url":"http://securitytracker.com/id?1024999","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024999"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64959","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64959"},{"reference_url":"https://kb.isc.org/article/AA-00456","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-00456"},{"reference_url":"http://www.debian.org/security/2011/dsa-2184","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2184"},{"reference_url":"http://www.isc.org/software/dhcp/advisories/cve-2011-0413","reference_id":"","reference_type":"","scores":[],"url":"http://www.isc.org/software/dhcp/advisories/cve-2011-0413"},{"reference_url":"http://www.kb.cert.org/vuls/id/686084","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/686084"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:022","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:022"},{"reference_url":"http://www.osvdb.org/70680","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/70680"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0256.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0256.html"},{"reference_url":"http://www.securityfocus.com/bid/46035","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46035"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0235","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0235"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0266","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0266"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0300","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0300"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0400","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0400"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0583","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0583"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611217","reference_id":"611217","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611217"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=672755","reference_id":"672755","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=672755"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.2:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.2:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.3:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.3:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.3:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.3:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.3:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.3:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0-esv:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0-esv:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0-esv:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0413","reference_id":"CVE-2011-0413","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0413"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0256","reference_id":"RHSA-2011:0256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0256"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572026?format=json","purl":"pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%2Bdeb70u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-6n54-npev-97ep"},{"vulnerability":"VCID-7w4b-sk4v-3bd8"},{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-g3ma-agz7-eka4"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-rm9p-arpx-6qdu"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-wc57-hq32-vfgn"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%252Bdeb70u8"}],"aliases":["CVE-2011-0413"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e4yf-gnwv-4bap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35816?format=json","vulnerability_id":"VCID-g3ma-agz7-eka4","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3571.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3571.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3571","reference_id":"","reference_type":"","scores":[{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95537","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95545","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95551","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95562","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95565","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95569","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.9557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.9558","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95604","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174","reference_id":"686174","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=842420","reference_id":"842420","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=842420"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37538.py","reference_id":"CVE-2012-3571;OSVDB-84255","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37538.py"},{"reference_url":"https://www.securityfocus.com/bid/54665/info","reference_id":"CVE-2012-3571;OSVDB-84255","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/54665/info"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1140","reference_id":"RHSA-2012:1140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1141","reference_id":"RHSA-2012:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1141"},{"reference_url":"https://usn.ubuntu.com/1519-1/","reference_id":"USN-1519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035589?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6"}],"aliases":["CVE-2012-3571"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g3ma-agz7-eka4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35811?format=json","vulnerability_id":"VCID-hjry-zy32-vfcp","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2749.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2749","reference_id":"","reference_type":"","scores":[{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98884","published_at":"2026-04-08T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98883","published_at":"2026-04-09T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98885","published_at":"2026-04-12T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98886","published_at":"2026-04-13T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98887","published_at":"2026-04-16T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98893","published_at":"2026-04-21T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98897","published_at":"2026-04-26T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98899","published_at":"2026-04-29T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98902","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638404","reference_id":"638404","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638404"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=729382","reference_id":"729382","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=729382"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1160","reference_id":"RHSA-2011:1160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1160"},{"reference_url":"https://usn.ubuntu.com/1190-1/","reference_id":"USN-1190-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1190-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572026?format=json","purl":"pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%2Bdeb70u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-6n54-npev-97ep"},{"vulnerability":"VCID-7w4b-sk4v-3bd8"},{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-g3ma-agz7-eka4"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-rm9p-arpx-6qdu"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-wc57-hq32-vfgn"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%252Bdeb70u8"}],"aliases":["CVE-2011-2749"],"risk_score":0.3,"exploitability":"0.5","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hjry-zy32-vfcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50134?format=json","vulnerability_id":"VCID-hubm-k681-pkb1","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which could allow for the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3144.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3144","reference_id":"","reference_type":"","scores":[{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95059","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95122","published_at":"2026-05-05T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95107","published_at":"2026-04-24T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95109","published_at":"2026-04-26T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.9511","published_at":"2026-04-29T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95069","published_at":"2026-04-02T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.9507","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95079","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95089","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.9509","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17594","scoring_system":"epss","scoring_elements":"0.95102","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kb.isc.org/docs/aa-01541","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/aa-01541"},{"reference_url":"https://www.debian.org/security/2018/dsa-4133","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4133"},{"reference_url":"http://www.securityfocus.com/bid/102726","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102726"},{"reference_url":"http://www.securitytracker.com/id/1040194","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040194"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1522918","reference_id":"1522918","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1522918"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887413","reference_id":"887413","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887413"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3144","reference_id":"CVE-2017-3144","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3144"},{"reference_url":"https://security.gentoo.org/glsa/201804-05","reference_id":"GLSA-201804-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0158","reference_id":"RHSA-2018:0158","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0158"},{"reference_url":"https://usn.ubuntu.com/3586-1/","reference_id":"USN-3586-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3586-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035590?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1036939?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.5-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.5-3%252Bdeb9u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1049942?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.1-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2%252Bdeb10u1"}],"aliases":["CVE-2017-3144"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hubm-k681-pkb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35810?format=json","vulnerability_id":"VCID-m3fx-k6et-ykg3","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2748.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2748.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2748","reference_id":"","reference_type":"","scores":[{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99466","published_at":"2026-04-01T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99465","published_at":"2026-04-02T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99467","published_at":"2026-04-04T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99469","published_at":"2026-04-07T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99471","published_at":"2026-04-09T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99475","published_at":"2026-04-21T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99479","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638404","reference_id":"638404","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638404"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=729382","reference_id":"729382","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=729382"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1160","reference_id":"RHSA-2011:1160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1160"},{"reference_url":"https://usn.ubuntu.com/1190-1/","reference_id":"USN-1190-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1190-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572026?format=json","purl":"pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%2Bdeb70u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-6n54-npev-97ep"},{"vulnerability":"VCID-7w4b-sk4v-3bd8"},{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-g3ma-agz7-eka4"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-rm9p-arpx-6qdu"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-wc57-hq32-vfgn"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%252Bdeb70u8"}],"aliases":["CVE-2011-2748"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m3fx-k6et-ykg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50136?format=json","vulnerability_id":"VCID-n362-tq55-tkha","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which could allow for the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5733.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5733.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5733","reference_id":"","reference_type":"","scores":[{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93499","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93574","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93564","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93568","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93566","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93516","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93533","published_at":"2026-04-11T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11316","scoring_system":"epss","scoring_elements":"0.93551","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kb.isc.org/docs/aa-01567","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/aa-01567"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20250425-0010/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20250425-0010/"},{"reference_url":"https://www.debian.org/security/2018/dsa-4133","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4133"},{"reference_url":"http://www.securityfocus.com/bid/103188","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/103188"},{"reference_url":"http://www.securitytracker.com/id/1040437","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040437"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1549961","reference_id":"1549961","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1549961"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891785","reference_id":"891785","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891785"},{"reference_url":"https://security.archlinux.org/ASA-201803-4","reference_id":"ASA-201803-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-4"},{"reference_url":"https://security.archlinux.org/AVG-646","reference_id":"AVG-646","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-646"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5733","reference_id":"CVE-2018-5733","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5733"},{"reference_url":"https://security.gentoo.org/glsa/201804-05","reference_id":"GLSA-201804-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0469","reference_id":"RHSA-2018:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0483","reference_id":"RHSA-2018:0483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0483"},{"reference_url":"https://usn.ubuntu.com/3586-1/","reference_id":"USN-3586-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3586-1/"},{"reference_url":"https://usn.ubuntu.com/3586-2/","reference_id":"USN-3586-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3586-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035590?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1036939?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.5-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.5-3%252Bdeb9u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1049942?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.1-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2%252Bdeb10u1"}],"aliases":["CVE-2018-5733"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n362-tq55-tkha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62107?format=json","vulnerability_id":"VCID-nyv5-m9g6-kqb3","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175594.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175594.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00162.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00162.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00168.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00168.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8605.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8605.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8605","reference_id":"","reference_type":"","scores":[{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97528","published_at":"2026-05-05T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97521","published_at":"2026-04-21T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97523","published_at":"2026-04-29T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97486","published_at":"2026-04-01T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97496","published_at":"2026-04-04T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97503","published_at":"2026-04-08T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97504","published_at":"2026-04-09T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.9751","published_at":"2026-04-12T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97511","published_at":"2026-04-13T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.97519","published_at":"2026-04-24T12:55:00Z"},{"value":"0.4344","scoring_system":"epss","scoring_elements":"0.9752","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8605"},{"reference_url":"https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"},{"reference_url":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kb.isc.org/article/AA-01334","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01334"},{"reference_url":"http://www.debian.org/security/2016/dsa-3442","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3442"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"},{"reference_url":"http://www.securityfocus.com/bid/80703","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/80703"},{"reference_url":"http://www.securitytracker.com/id/1034657","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034657"},{"reference_url":"http://www.ubuntu.com/usn/USN-2868-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2868-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1297314","reference_id":"1297314","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1297314"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810875","reference_id":"810875","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810875"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.3:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.3:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.3:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.0.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.0.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.3:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.5:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.5:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.5:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.6:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.6:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.7:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.8:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.8:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.3:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.3:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.3:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_up2date:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sophos:unified_threat_management_up2date:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_up2date:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8605","reference_id":"CVE-2015-8605","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8605"},{"reference_url":"https://usn.ubuntu.com/2868-1/","reference_id":"USN-2868-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2868-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572026?format=json","purl":"pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%2Bdeb70u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-6n54-npev-97ep"},{"vulnerability":"VCID-7w4b-sk4v-3bd8"},{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-g3ma-agz7-eka4"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-rm9p-arpx-6qdu"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-wc57-hq32-vfgn"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%252Bdeb70u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1035590?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1036939?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.5-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.5-3%252Bdeb9u1"}],"aliases":["CVE-2015-8605"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nyv5-m9g6-kqb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35809?format=json","vulnerability_id":"VCID-qg1j-mnkq-s3b1","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=133226187115472&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=133226187115472&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0997.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0997.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0997","reference_id":"","reference_type":"","scores":[{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.9882","published_at":"2026-05-05T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98793","published_at":"2026-04-01T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98802","published_at":"2026-04-11T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98808","published_at":"2026-04-16T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98809","published_at":"2026-04-18T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98812","published_at":"2026-04-21T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98815","published_at":"2026-04-26T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98816","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997"},{"reference_url":"http://secunia.com/advisories/44037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44037"},{"reference_url":"http://secunia.com/advisories/44048","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44048"},{"reference_url":"http://secunia.com/advisories/44089","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44089"},{"reference_url":"http://secunia.com/advisories/44090","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44090"},{"reference_url":"http://secunia.com/advisories/44103","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44103"},{"reference_url":"http://secunia.com/advisories/44127","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44127"},{"reference_url":"http://secunia.com/advisories/44180","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44180"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201301-06.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201301-06.xml"},{"reference_url":"http://securitytracker.com/id?1025300","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025300"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66580","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593345","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593345"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"},{"reference_url":"https://www.exploit-db.com/exploits/37623/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/37623/"},{"reference_url":"https://www.isc.org/software/dhcp/advisories/cve-2011-0997","reference_id":"","reference_type":"","scores":[],"url":"https://www.isc.org/software/dhcp/advisories/cve-2011-0997"},{"reference_url":"http://www.debian.org/security/2011/dsa-2216","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2216"},{"reference_url":"http://www.debian.org/security/2011/dsa-2217","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2217"},{"reference_url":"http://www.kb.cert.org/vuls/id/107886","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/107886"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:073","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"},{"reference_url":"http://www.osvdb.org/71493","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/71493"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0428.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0428.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0840.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0840.html"},{"reference_url":"http://www.securityfocus.com/bid/47176","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47176"},{"reference_url":"http://www.ubuntu.com/usn/USN-1108-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1108-1"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0879","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0879"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0886","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0886"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0909","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0909"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0915","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0915"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0926","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0926"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0965","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0965"},{"reference_url":"http://www.vupen.com/english/advisories/2011/1000","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/1000"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621099","reference_id":"621099","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621099"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=689832","reference_id":"689832","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=689832"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0997","reference_id":"CVE-2011-0997","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0997"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0428","reference_id":"RHSA-2011:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0840","reference_id":"RHSA-2011:0840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0840"},{"reference_url":"https://usn.ubuntu.com/1108-1/","reference_id":"USN-1108-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1108-1/"},{"reference_url":"https://usn.ubuntu.com/1108-2/","reference_id":"USN-1108-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1108-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572026?format=json","purl":"pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%2Bdeb70u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-6n54-npev-97ep"},{"vulnerability":"VCID-7w4b-sk4v-3bd8"},{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-g3ma-agz7-eka4"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-rm9p-arpx-6qdu"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-wc57-hq32-vfgn"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%252Bdeb70u8"}],"aliases":["CVE-2011-0997"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qg1j-mnkq-s3b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35814?format=json","vulnerability_id":"VCID-rm9p-arpx-6qdu","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3570.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3570.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3570","reference_id":"","reference_type":"","scores":[{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87863","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87873","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87887","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.8789","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87911","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87917","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87952","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87958","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87969","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174","reference_id":"686174","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=842424","reference_id":"842424","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=842424"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035589?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6"}],"aliases":["CVE-2012-3570"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rm9p-arpx-6qdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61913?format=json","vulnerability_id":"VCID-vwd3-4x2n-ckfv","summary":"Multiple vulnerabilities have been discovered in ISC DHCP, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2929.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2929","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16409","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16686","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16588","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16763","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16648","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24303","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24337","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24123","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021320","reference_id":"1021320","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021320"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2132001","reference_id":"2132001","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2132001"},{"reference_url":"https://security.gentoo.org/glsa/202305-22","reference_id":"GLSA-202305-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2502","reference_id":"RHSA-2023:2502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3000","reference_id":"RHSA-2023:3000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3000"},{"reference_url":"https://usn.ubuntu.com/5658-1/","reference_id":"USN-5658-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5658-1/"},{"reference_url":"https://usn.ubuntu.com/5658-2/","reference_id":"USN-5658-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5658-2/"},{"reference_url":"https://usn.ubuntu.com/5658-3/","reference_id":"USN-5658-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5658-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049943?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.1-2.3%2Bdeb11u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2.3%252Bdeb11u2"}],"aliases":["CVE-2022-2929"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwd3-4x2n-ckfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35822?format=json","vulnerability_id":"VCID-wc57-hq32-vfgn","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088882.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088882.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086992.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086992.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088220.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088220.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00088.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00088.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00103.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00103.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00105.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00105.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0504.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3955.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3955.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3955","reference_id":"","reference_type":"","scores":[{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93756","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93825","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93765","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.9379","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93817","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93824","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93828","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16816","scoring_system":"epss","scoring_elements":"0.94978","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3955"},{"reference_url":"https://blogs.oracle.com/sunsecurity/entry/cve_2012_3955_denial_of","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.oracle.com/sunsecurity/entry/cve_2012_3955_denial_of"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955"},{"reference_url":"http://secunia.com/advisories/51318","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51318"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201301-06.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201301-06.xml"},{"reference_url":"https://kb.isc.org/article/AA-00779","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-00779"},{"reference_url":"http://www.debian.org/security/2012/dsa-2551","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2012/dsa-2551"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:153"},{"reference_url":"http://www.securityfocus.com/bid/55530","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55530"},{"reference_url":"http://www.securitytracker.com/id?1027528","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027528"},{"reference_url":"http://www.ubuntu.com/usn/USN-1571-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1571-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=856766","reference_id":"856766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=856766"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3955","reference_id":"CVE-2012-3955","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3955"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0504","reference_id":"RHSA-2013:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0504"},{"reference_url":"https://usn.ubuntu.com/1571-1/","reference_id":"USN-1571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035589?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6"}],"aliases":["CVE-2012-3955"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wc57-hq32-vfgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83310?format=json","vulnerability_id":"VCID-yf9w-gpqd-2yga","summary":"dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6470.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6470.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6470","reference_id":"","reference_type":"","scores":[{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49939","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49872","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49997","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50002","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49957","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49976","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50004","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49954","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50003","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.4999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50036","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50037","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6470"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896122","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896122"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6470"},{"reference_url":"https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00048.html"},{"reference_url":"https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00049.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1708641","reference_id":"1708641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1708641"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcpd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcpd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcpd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6470","reference_id":"CVE-2019-6470","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2060","reference_id":"RHSA-2019:2060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3525","reference_id":"RHSA-2019:3525","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3525"},{"reference_url":"https://usn.ubuntu.com/3973-1/","reference_id":"USN-3973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049942?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.1-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2%252Bdeb10u1"}],"aliases":["CVE-2019-6470"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yf9w-gpqd-2yga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85304?format=json","vulnerability_id":"VCID-zkkh-dw89-23gg","summary":"dhcp: unclosed TCP connections to OMAPI or failover ports can cause DoS","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2590.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2590.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2774.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2774.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2774","reference_id":"","reference_type":"","scores":[{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98511","published_at":"2026-05-05T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98509","published_at":"2026-04-26T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98506","published_at":"2026-04-29T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98483","published_at":"2026-04-01T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98487","published_at":"2026-04-04T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98492","published_at":"2026-04-08T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98493","published_at":"2026-04-09T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98496","published_at":"2026-04-13T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98495","published_at":"2026-04-12T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98502","published_at":"2026-04-16T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98503","published_at":"2026-04-18T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.65582","scoring_system":"epss","scoring_elements":"0.98508","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kb.isc.org/article/AA-01354","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01354"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"reference_url":"http://www.securityfocus.com/bid/84208","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/84208"},{"reference_url":"http://www.securitytracker.com/id/1035196","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035196"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315259","reference_id":"1315259","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315259"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817158","reference_id":"817158","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817158"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.3:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.4:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.4:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.5:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.5:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.5:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.6:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.6:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.7:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.8:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.8:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.8:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.3:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.3:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.3:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.3:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.3.3:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.3.3:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2774","reference_id":"CVE-2016-2774","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2590","reference_id":"RHSA-2016:2590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2590"},{"reference_url":"https://usn.ubuntu.com/3586-1/","reference_id":"USN-3586-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3586-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036939?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.5-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.5-3%252Bdeb9u1"}],"aliases":["CVE-2016-2774"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zkkh-dw89-23gg"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.1.1-P1-15%252Bsqueeze8"}