{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","type":"deb","namespace":"debian","name":"bind9","version":"0","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"9.7.1.dfsg.P2","latest_non_vulnerable_version":"1:9.20.22-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78714?format=json","vulnerability_id":"VCID-113v-hjhz-mqa1","summary":"bind: processing specially crafted responses in quick succession may lead to assertion failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3488.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3488.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3488","reference_id":"","reference_type":"","scores":[{"value":"0.12192","scoring_system":"epss","scoring_elements":"0.93815","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12192","scoring_system":"epss","scoring_elements":"0.93805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13857","scoring_system":"epss","scoring_elements":"0.94296","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13857","scoring_system":"epss","scoring_elements":"0.94291","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13857","scoring_system":"epss","scoring_elements":"0.94294","published_at":"2026-04-11T12:55:00Z"},{"value":"0.13857","scoring_system":"epss","scoring_elements":"0.94295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13857","scoring_system":"epss","scoring_elements":"0.94278","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13857","scoring_system":"epss","scoring_elements":"0.94287","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3488"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2164709","reference_id":"2164709","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2164709"},{"reference_url":"https://kb.isc.org/docs/cve-2022-3488","reference_id":"cve-2022-3488","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-01T14:12:10Z/"}],"url":"https://kb.isc.org/docs/cve-2022-3488"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-3488"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-113v-hjhz-mqa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82587?format=json","vulnerability_id":"VCID-1b5w-gp85-qfhw","summary":"bind: flaw in nxredirect can cause assertion failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6467.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6467.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6467","reference_id":"","reference_type":"","scores":[{"value":"0.17224","scoring_system":"epss","scoring_elements":"0.94989","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17224","scoring_system":"epss","scoring_elements":"0.95024","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17224","scoring_system":"epss","scoring_elements":"0.95015","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17224","scoring_system":"epss","scoring_elements":"0.95021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17224","scoring_system":"epss","scoring_elements":"0.95022","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17224","scoring_system":"epss","scoring_elements":"0.94998","published_at":"2026-04-02T12:55:00Z"},{"value":"0.17224","scoring_system":"epss","scoring_elements":"0.95","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17224","scoring_system":"epss","scoring_elements":"0.95003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17224","scoring_system":"epss","scoring_elements":"0.95011","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6467"},{"reference_url":"https://kb.isc.org/docs/cve-2019-6467","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/cve-2019-6467"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_19_20","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/security/advisory/Synology_SA_19_20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1702545","reference_id":"1702545","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1702545"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6467","reference_id":"CVE-2019-6467","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6467"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2019-6467"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1b5w-gp85-qfhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83448?format=json","vulnerability_id":"VCID-29ng-3xgz-hbh5","summary":"bind: Multiple transfers of a zone in quick succession can cause an assertion failure in rbtdb.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5736.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5736.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5736","reference_id":"","reference_type":"","scores":[{"value":"0.42906","scoring_system":"epss","scoring_elements":"0.97457","published_at":"2026-04-01T12:55:00Z"},{"value":"0.42906","scoring_system":"epss","scoring_elements":"0.97482","published_at":"2026-04-13T12:55:00Z"},{"value":"0.42906","scoring_system":"epss","scoring_elements":"0.97476","published_at":"2026-04-09T12:55:00Z"},{"value":"0.42906","scoring_system":"epss","scoring_elements":"0.97479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.42906","scoring_system":"epss","scoring_elements":"0.97481","published_at":"2026-04-12T12:55:00Z"},{"value":"0.42906","scoring_system":"epss","scoring_elements":"0.97464","published_at":"2026-04-02T12:55:00Z"},{"value":"0.42906","scoring_system":"epss","scoring_elements":"0.97468","published_at":"2026-04-07T12:55:00Z"},{"value":"0.42906","scoring_system":"epss","scoring_elements":"0.97475","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5736"},{"reference_url":"https://kb.isc.org/docs/aa-01602","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/aa-01602"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180926-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180926-0004/"},{"reference_url":"http://www.securityfocus.com/bid/104386","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104386"},{"reference_url":"http://www.securitytracker.com/id/1040941","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040941"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1578591","reference_id":"1578591","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1578591"},{"reference_url":"https://security.archlinux.org/ASA-201805-20","reference_id":"ASA-201805-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-20"},{"reference_url":"https://security.archlinux.org/AVG-706","reference_id":"AVG-706","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-706"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5736","reference_id":"CVE-2018-5736","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5736"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2018-5736"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-29ng-3xgz-hbh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64933?format=json","vulnerability_id":"VCID-2fs7-vy7z-mkb5","summary":"bind: bind: Denial of Service via corrupt or malicious record","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13878.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13878.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13878","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13046","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13087","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13106","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13067","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13878"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431600","reference_id":"2431600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431600"},{"reference_url":"https://downloads.isc.org/isc/bind9/9.18.44","reference_id":"9.18.44","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:57:50Z/"}],"url":"https://downloads.isc.org/isc/bind9/9.18.44"},{"reference_url":"https://downloads.isc.org/isc/bind9/9.20.18","reference_id":"9.20.18","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:57:50Z/"}],"url":"https://downloads.isc.org/isc/bind9/9.20.18"},{"reference_url":"https://downloads.isc.org/isc/bind9/9.21.17","reference_id":"9.21.17","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:57:50Z/"}],"url":"https://downloads.isc.org/isc/bind9/9.21.17"},{"reference_url":"https://kb.isc.org/docs/cve-2025-13878","reference_id":"cve-2025-13878","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:57:50Z/"}],"url":"https://kb.isc.org/docs/cve-2025-13878"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583182?format=json","purl":"pkg:deb/debian/bind9@1:9.18.44-1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.44-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583183?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-13878"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2fs7-vy7z-mkb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46333?format=json","vulnerability_id":"VCID-2r8j-u91u-p7gb","summary":"Multiple vulnerabilities have been found in BIND, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3868.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3868","reference_id":"","reference_type":"","scores":[{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.8348","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83507","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83556","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.8355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83546","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3868"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=842895","reference_id":"842895","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=842895"},{"reference_url":"https://security.gentoo.org/glsa/201209-04","reference_id":"GLSA-201209-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3868"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2r8j-u91u-p7gb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86258?format=json","vulnerability_id":"VCID-3q3b-aefg-53db","summary":"bind: assertion failure during EDNS option processing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3859.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3859.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3859","reference_id":"","reference_type":"","scores":[{"value":"0.29819","scoring_system":"epss","scoring_elements":"0.96637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29819","scoring_system":"epss","scoring_elements":"0.96603","published_at":"2026-04-01T12:55:00Z"},{"value":"0.29819","scoring_system":"epss","scoring_elements":"0.96612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.29819","scoring_system":"epss","scoring_elements":"0.96617","published_at":"2026-04-04T12:55:00Z"},{"value":"0.29819","scoring_system":"epss","scoring_elements":"0.96621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.29819","scoring_system":"epss","scoring_elements":"0.96629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29819","scoring_system":"epss","scoring_elements":"0.96631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29819","scoring_system":"epss","scoring_elements":"0.96633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.29819","scoring_system":"epss","scoring_elements":"0.96634","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3859"},{"reference_url":"http://secunia.com/advisories/58946","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/58946"},{"reference_url":"https://kb.isc.org/article/AA-01166/","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01166/"},{"reference_url":"https://kb.isc.org/article/AA-01171/","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01171/"},{"reference_url":"http://www.securityfocus.com/bid/68193","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68193"},{"reference_url":"http://www.securitytracker.com/id/1030414","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030414"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1108544","reference_id":"1108544","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1108544"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3859","reference_id":"CVE-2014-3859","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3859"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-3859"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3q3b-aefg-53db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63994?format=json","vulnerability_id":"VCID-5duc-79fr-9ucf","summary":"bind: BIND: Denial of Service via authenticated TKEY queries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3119.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3119.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3119","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03369","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03331","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03381","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03397","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03401","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03354","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3119"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451308","reference_id":"2451308","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451308"},{"reference_url":"https://downloads.isc.org/isc/bind9/9.20.21","reference_id":"9.20.21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:13:41Z/"}],"url":"https://downloads.isc.org/isc/bind9/9.20.21"},{"reference_url":"https://downloads.isc.org/isc/bind9/9.21.20","reference_id":"9.21.20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:13:41Z/"}],"url":"https://downloads.isc.org/isc/bind9/9.21.20"},{"reference_url":"https://kb.isc.org/docs/cve-2026-3119","reference_id":"cve-2026-3119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:13:41Z/"}],"url":"https://kb.isc.org/docs/cve-2026-3119"},{"reference_url":"https://usn.ubuntu.com/8124-1/","reference_id":"USN-8124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8124-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584546?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2026-3119"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5duc-79fr-9ucf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83449?format=json","vulnerability_id":"VCID-5pz4-bxq7-27gh","summary":"bind: Interaction between NSEC aggresive negative caching and the serve-stale feature can cause a denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5737.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5737.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5737","reference_id":"","reference_type":"","scores":[{"value":"0.01186","scoring_system":"epss","scoring_elements":"0.7874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01186","scoring_system":"epss","scoring_elements":"0.78791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01186","scoring_system":"epss","scoring_elements":"0.78787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01186","scoring_system":"epss","scoring_elements":"0.78794","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01186","scoring_system":"epss","scoring_elements":"0.78817","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01186","scoring_system":"epss","scoring_elements":"0.788","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01186","scoring_system":"epss","scoring_elements":"0.78748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01186","scoring_system":"epss","scoring_elements":"0.78779","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01186","scoring_system":"epss","scoring_elements":"0.78761","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5737"},{"reference_url":"https://kb.isc.org/docs/aa-01606","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/aa-01606"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180926-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180926-0004/"},{"reference_url":"http://www.securityfocus.com/bid/104236","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104236"},{"reference_url":"http://www.securitytracker.com/id/1040942","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040942"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1578593","reference_id":"1578593","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1578593"},{"reference_url":"https://security.archlinux.org/ASA-201805-20","reference_id":"ASA-201805-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-20"},{"reference_url":"https://security.archlinux.org/AVG-706","reference_id":"AVG-706","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-706"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5737","reference_id":"CVE-2018-5737","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5737"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2018-5737"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5pz4-bxq7-27gh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87648?format=json","vulnerability_id":"VCID-69p9-m1zr-tfc4","summary":"Bind: Unitended availability of cache data.","references":[{"reference_url":"http://ftp.isc.org/isc/bind9/9.7.2-P2/RELEASE-NOTES-BIND-9.7.2-P2.html","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.isc.org/isc/bind9/9.7.2-P2/RELEASE-NOTES-BIND-9.7.2-P2.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0218.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0218","reference_id":"","reference_type":"","scores":[{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84122","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84066","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84083","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84108","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84126","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0218"},{"reference_url":"https://lists.isc.org/pipermail/bind-announce/2010-September/000655.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.isc.org/pipermail/bind-announce/2010-September/000655.html"},{"reference_url":"http://www.kb.cert.org/vuls/id/784855","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/784855"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=640696","reference_id":"640696","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=640696"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0218","reference_id":"CVE-2010-0218","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0218"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2010-0218"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-69p9-m1zr-tfc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78077?format=json","vulnerability_id":"VCID-6wr2-6cwv-fqfb","summary":"bind: an assertion failure may lead to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4236.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4236.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4236","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39255","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39175","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.3923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39246","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39258","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.3922","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39201","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4236"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052417","reference_id":"1052417","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239661","reference_id":"2239661","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239661"},{"reference_url":"https://usn.ubuntu.com/6390-1/","reference_id":"USN-6390-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6390-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/585368?format=json","purl":"pkg:deb/debian/bind9@1:9.18.19-1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.19-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/585369?format=json","purl":"pkg:deb/debian/bind9@1:9.19.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.19.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2023-4236"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6wr2-6cwv-fqfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63993?format=json","vulnerability_id":"VCID-78pe-7amf-vkgu","summary":"bind: BIND: Unauthorized access due to use-after-return vulnerability in DNS query handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3591.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3591","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04995","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04979","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05001","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05034","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0505","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05013","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3591"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451298","reference_id":"2451298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451298"},{"reference_url":"https://downloads.isc.org/isc/bind9/9.20.21","reference_id":"9.20.21","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:12:43Z/"}],"url":"https://downloads.isc.org/isc/bind9/9.20.21"},{"reference_url":"https://downloads.isc.org/isc/bind9/9.21.20","reference_id":"9.21.20","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:12:43Z/"}],"url":"https://downloads.isc.org/isc/bind9/9.21.20"},{"reference_url":"https://kb.isc.org/docs/cve-2026-3591","reference_id":"cve-2026-3591","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:12:43Z/"}],"url":"https://kb.isc.org/docs/cve-2026-3591"},{"reference_url":"https://usn.ubuntu.com/8124-1/","reference_id":"USN-8124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8124-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584546?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2026-3591"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-78pe-7amf-vkgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88538?format=json","vulnerability_id":"VCID-7be7-f2ha-r7h6","summary":"libbind off-by-one buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0122.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0122.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0122","reference_id":"","reference_type":"","scores":[{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75931","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75934","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75946","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75979","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.76018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82277","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0122"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=429149","reference_id":"429149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=429149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0300","reference_id":"RHSA-2008:0300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0300"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2008-0122"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7be7-f2ha-r7h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82588?format=json","vulnerability_id":"VCID-7fzd-b48t-9kb4","summary":"bind: named can exit with an assertion failure if nxdomain-redirect is used.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6468.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6468.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6468","reference_id":"","reference_type":"","scores":[{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77546","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77552","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77589","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6468"},{"reference_url":"https://kb.isc.org/docs/cve-2019-6468","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/cve-2019-6468"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_19_20","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/security/advisory/Synology_SA_19_20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1702642","reference_id":"1702642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1702642"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6468","reference_id":"CVE-2019-6468","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6468"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2019-6468"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7fzd-b48t-9kb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81911?format=json","vulnerability_id":"VCID-7mbz-t9jk-juca","summary":"bind: A flaw in mirror zone validity checking can allow zone data to be spoofed","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6475.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6475","reference_id":"","reference_type":"","scores":[{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70006","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70009","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70057","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70096","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70082","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70018","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70033","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6475"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kb.isc.org/docs/cve-2019-6475","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/cve-2019-6475"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191024-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191024-0004/"},{"reference_url":"https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1762914","reference_id":"1762914","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1762914"},{"reference_url":"https://security.archlinux.org/AVG-1056","reference_id":"AVG-1056","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1056"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6475","reference_id":"CVE-2019-6475","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6475"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2019-6475"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7mbz-t9jk-juca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48059?format=json","vulnerability_id":"VCID-7n8z-mhbn-xudt","summary":"Multiple vulnerabilities have been found in BIND, the worst of\n    which allows remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9778.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9778","reference_id":"","reference_type":"","scores":[{"value":"0.06614","scoring_system":"epss","scoring_elements":"0.91132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06614","scoring_system":"epss","scoring_elements":"0.91182","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06614","scoring_system":"epss","scoring_elements":"0.91145","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06614","scoring_system":"epss","scoring_elements":"0.91153","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06614","scoring_system":"epss","scoring_elements":"0.91166","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06614","scoring_system":"epss","scoring_elements":"0.91173","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06614","scoring_system":"epss","scoring_elements":"0.9118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06614","scoring_system":"epss","scoring_elements":"0.91137","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9778"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kb.isc.org/article/AA-01442/","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01442/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180926-0005/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180926-0005/"},{"reference_url":"http://www.securityfocus.com/bid/95388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/95388"},{"reference_url":"http://www.securitytracker.com/id/1037582","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1037582"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1411387","reference_id":"1411387","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1411387"},{"reference_url":"https://security.archlinux.org/ASA-201701-15","reference_id":"ASA-201701-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-15"},{"reference_url":"https://security.archlinux.org/AVG-132","reference_id":"AVG-132","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-132"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.9:s6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.9:s6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9778","reference_id":"CVE-2016-9778","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9778"},{"reference_url":"https://security.gentoo.org/glsa/201708-01","reference_id":"GLSA-201708-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201708-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9778"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7n8z-mhbn-xudt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49237?format=json","vulnerability_id":"VCID-a88r-72p7-p3bf","summary":"Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2906.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2906.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2906","reference_id":"","reference_type":"","scores":[{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.7496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75001","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74989","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.7501","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75011","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2906"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2128598","reference_id":"2128598","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2128598"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/09/21/3","reference_id":"3","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:25:54Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/09/21/3"},{"reference_url":"https://kb.isc.org/docs/cve-2022-2906","reference_id":"cve-2022-2906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:25:54Z/"}],"url":"https://kb.isc.org/docs/cve-2022-2906"},{"reference_url":"https://security.gentoo.org/glsa/202210-25","reference_id":"GLSA-202210-25","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:25:54Z/"}],"url":"https://security.gentoo.org/glsa/202210-25"},{"reference_url":"https://usn.ubuntu.com/5626-1/","reference_id":"USN-5626-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5626-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582718?format=json","purl":"pkg:deb/debian/bind9@1:9.18.7-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.7-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-2906"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a88r-72p7-p3bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77776?format=json","vulnerability_id":"VCID-a8r3-wrvw-fyhm","summary":"bind: bind9: DNS-over-HTTPS implementation suffers from multiple issues under heavy query load","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12705.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-12705","reference_id":"","reference_type":"","scores":[{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.4135","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41375","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41395","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41364","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.4136","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.4139","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41367","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-12705"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094735","reference_id":"1094735","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094735"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2342880","reference_id":"2342880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2342880"},{"reference_url":"https://kb.isc.org/docs/cve-2024-12705","reference_id":"cve-2024-12705","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T15:25:35Z/"}],"url":"https://kb.isc.org/docs/cve-2024-12705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1670","reference_id":"RHSA-2025:1670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1907","reference_id":"RHSA-2025:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1907"},{"reference_url":"https://usn.ubuntu.com/7241-1/","reference_id":"USN-7241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7241-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584536?format=json","purl":"pkg:deb/debian/bind9@1:9.18.33-1~deb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.33-1~deb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584537?format=json","purl":"pkg:deb/debian/bind9@1:9.20.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-12705"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a8r3-wrvw-fyhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82931?format=json","vulnerability_id":"VCID-acny-gm8c-pyam","summary":"bind: Crash from assertion error when debug log level is 10 and log entries meet buffer boundary","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5742.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5742.json"},{"reference_url":"https://access.redhat.com/security/cve/cve-2018-5742","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/cve-2018-5742"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5742","reference_id":"","reference_type":"","scores":[{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.7968","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79735","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79722","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79729","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79751","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79687","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79708","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5742"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1655844","reference_id":"1655844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1655844"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5742","reference_id":"CVE-2018-5742","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0194","reference_id":"RHSA-2019:0194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0194"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2018-5742"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-acny-gm8c-pyam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79582?format=json","vulnerability_id":"VCID-b3u2-wjzm-duhc","summary":"bind: When chasing DS records, a timed-out or artificially delayed fetch could cause 'named' to crash while resuming a DS lookup","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0667.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0667.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0667","reference_id":"","reference_type":"","scores":[{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71825","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71901","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71883","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71834","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71853","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71827","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71877","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0667"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2064515","reference_id":"2064515","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2064515"},{"reference_url":"https://security.archlinux.org/ASA-202204-5","reference_id":"ASA-202204-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202204-5"},{"reference_url":"https://security.archlinux.org/AVG-2661","reference_id":"AVG-2661","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2661"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584960?format=json","purl":"pkg:deb/debian/bind9@1:9.18.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-0667"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b3u2-wjzm-duhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90536?format=json","vulnerability_id":"VCID-b47j-67kw-4bgv","summary":"Unspecified vulnerability in ISC BIND 9.3.5-P2-W1, 9.4.2-P2-W1, and 9.5.0-P2-W1 on Windows allows remote attackers to cause a denial of service (UDP client handler termination) via unknown vectors.","references":[{"reference_url":"http://marc.info/?l=bind-announce&m=122180244228376&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bind-announce&m=122180244228376&w=2"},{"reference_url":"http://marc.info/?l=bind-announce&m=122180244228378&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bind-announce&m=122180244228378&w=2"},{"reference_url":"http://marc.info/?l=bind-announce&m=122180376630150&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bind-announce&m=122180376630150&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4163.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4163.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4163","reference_id":"","reference_type":"","scores":[{"value":"0.26697","scoring_system":"epss","scoring_elements":"0.96341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26697","scoring_system":"epss","scoring_elements":"0.96303","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26697","scoring_system":"epss","scoring_elements":"0.96311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26697","scoring_system":"epss","scoring_elements":"0.96318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26697","scoring_system":"epss","scoring_elements":"0.96323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26697","scoring_system":"epss","scoring_elements":"0.96331","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26697","scoring_system":"epss","scoring_elements":"0.96335","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26697","scoring_system":"epss","scoring_elements":"0.96339","published_at":"2026-04-11T12:55:00Z"},{"value":"0.26697","scoring_system":"epss","scoring_elements":"0.96338","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4163"},{"reference_url":"http://secunia.com/advisories/31924","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31924"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45234","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45234"},{"reference_url":"http://www.securityfocus.com/bid/31252","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31252"},{"reference_url":"http://www.securitytracker.com/id?1020901","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020901"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2637","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2637"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.5:p2_w1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3.5:p2_w1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.5:p2_w1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:p2_w1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.2:p2_w1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:p2_w1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:p2_w1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.0:p2_w1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:p2_w1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4163","reference_id":"CVE-2008-4163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4163"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2008-4163"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b47j-67kw-4bgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81912?format=json","vulnerability_id":"VCID-cufc-v1hn-jbdn","summary":"bind: An error in QNAME minimization code can cause BIND to exit with an assertion failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6476.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6476.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6476","reference_id":"","reference_type":"","scores":[{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79427","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79445","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79481","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79503","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79486","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79434","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79458","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6476"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kb.isc.org/docs/cve-2019-6476","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/cve-2019-6476"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191024-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191024-0004/"},{"reference_url":"https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1762957","reference_id":"1762957","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1762957"},{"reference_url":"https://security.archlinux.org/AVG-1056","reference_id":"AVG-1056","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1056"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6476","reference_id":"CVE-2019-6476","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6476"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2019-6476"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cufc-v1hn-jbdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/102721?format=json","vulnerability_id":"VCID-d76w-pkgv-1kdj","summary":"Unknown vulnerability in BIND 9.2.0 in HP-UX B.11.00, B.11.11, and B.11.23 allows remote attackers to cause a denial of service.","references":[{"reference_url":"http://marc.info/?l=bugtraq&m=110805105200470&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110805105200470&w=2"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0364","reference_id":"","reference_type":"","scores":[{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74471","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74423","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74427","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74477","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74499","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.7448","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0364"},{"reference_url":"http://secunia.com/advisories/14220/","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/14220/"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19276","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19276"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5690","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5690"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*","reference_id":"cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0364","reference_id":"CVE-2005-0364","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2005-0364"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d76w-pkgv-1kdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31461?format=json","vulnerability_id":"VCID-d9kh-wcwu-mbdg","summary":"Multiple vulnerabilities have been found in BIND, the worst of\n    which could cause a Denial of Service condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2088.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2088.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2088","reference_id":"","reference_type":"","scores":[{"value":"0.48434","scoring_system":"epss","scoring_elements":"0.97745","published_at":"2026-04-13T12:55:00Z"},{"value":"0.48434","scoring_system":"epss","scoring_elements":"0.97744","published_at":"2026-04-12T12:55:00Z"},{"value":"0.48434","scoring_system":"epss","scoring_elements":"0.97723","published_at":"2026-04-01T12:55:00Z"},{"value":"0.48434","scoring_system":"epss","scoring_elements":"0.97729","published_at":"2026-04-02T12:55:00Z"},{"value":"0.48434","scoring_system":"epss","scoring_elements":"0.97731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.48434","scoring_system":"epss","scoring_elements":"0.97736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.48434","scoring_system":"epss","scoring_elements":"0.9774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.48434","scoring_system":"epss","scoring_elements":"0.97742","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2088"},{"reference_url":"https://kb.isc.org/article/AA-01351","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01351"},{"reference_url":"https://kb.isc.org/article/AA-01380","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01380"},{"reference_url":"http://www.securityfocus.com/bid/84290","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/84290"},{"reference_url":"http://www.securitytracker.com/id/1035238","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035238"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315690","reference_id":"1315690","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315690"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2088","reference_id":"CVE-2016-2088","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2088"},{"reference_url":"https://security.gentoo.org/glsa/201610-07","reference_id":"GLSA-201610-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2016-2088"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d9kh-wcwu-mbdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/159883?format=json","vulnerability_id":"VCID-gr3d-pzrc-uydb","summary":"rdataset.c in ISC BIND 9 Supported Preview Edition 9.9.8-S before 9.9.8-S5, when nxdomain-redirect is enabled, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via crafted flag values in a query.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1284","reference_id":"","reference_type":"","scores":[{"value":"0.09482","scoring_system":"epss","scoring_elements":"0.92824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09482","scoring_system":"epss","scoring_elements":"0.92825","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09482","scoring_system":"epss","scoring_elements":"0.92798","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09482","scoring_system":"epss","scoring_elements":"0.92804","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09482","scoring_system":"epss","scoring_elements":"0.92809","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09482","scoring_system":"epss","scoring_elements":"0.92807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09482","scoring_system":"epss","scoring_elements":"0.92817","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09482","scoring_system":"epss","scoring_elements":"0.92821","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1284"},{"reference_url":"https://kb.isc.org/article/AA-01348","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01348"},{"reference_url":"https://kb.isc.org/article/AA-01438","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01438"},{"reference_url":"http://www.securitytracker.com/id/1034935","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034935"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:s4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1284","reference_id":"CVE-2016-1284","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1284"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1284"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gr3d-pzrc-uydb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34832?format=json","vulnerability_id":"VCID-h36g-3jnc-qqaq","summary":"Multiple vulnerabilities have been found in BIND, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3919.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3919.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3919","reference_id":"","reference_type":"","scores":[{"value":"0.09658","scoring_system":"epss","scoring_elements":"0.92877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09658","scoring_system":"epss","scoring_elements":"0.92885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09658","scoring_system":"epss","scoring_elements":"0.92888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09658","scoring_system":"epss","scoring_elements":"0.92886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10288","scoring_system":"epss","scoring_elements":"0.93168","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10288","scoring_system":"epss","scoring_elements":"0.93169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10288","scoring_system":"epss","scoring_elements":"0.9316","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10288","scoring_system":"epss","scoring_elements":"0.93165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10288","scoring_system":"epss","scoring_elements":"0.9317","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3919"},{"reference_url":"https://kb.isc.org/article/AA-00967/","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-00967/"},{"reference_url":"https://support.apple.com/kb/HT6536","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT6536"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=970905","reference_id":"970905","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=970905"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3919","reference_id":"CVE-2013-3919","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3919"},{"reference_url":"https://security.gentoo.org/glsa/201401-34","reference_id":"GLSA-201401-34","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-34"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2013-3919"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h36g-3jnc-qqaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/104745?format=json","vulnerability_id":"VCID-k1pn-qp6q-x3ew","summary":"BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-2211","reference_id":"","reference_type":"","scores":[{"value":"0.03336","scoring_system":"epss","scoring_elements":"0.87241","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03336","scoring_system":"epss","scoring_elements":"0.8725","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03336","scoring_system":"epss","scoring_elements":"0.87266","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03336","scoring_system":"epss","scoring_elements":"0.87263","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03336","scoring_system":"epss","scoring_elements":"0.87283","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03336","scoring_system":"epss","scoring_elements":"0.87291","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03336","scoring_system":"epss","scoring_elements":"0.87304","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03336","scoring_system":"epss","scoring_elements":"0.87298","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03336","scoring_system":"epss","scoring_elements":"0.87294","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-2211"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2002-2211"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k1pn-qp6q-x3ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84384?format=json","vulnerability_id":"VCID-k4qv-8ggs-afef","summary":"bind: assertion failure in DNSSEC validation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3139.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3139.json"},{"reference_url":"https://access.redhat.com/security/cve/cve-2017-3139","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/cve-2017-3139"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3139","reference_id":"","reference_type":"","scores":[{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.7249","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72538","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72565","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72548","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72497","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72514","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72529","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3139"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1447743","reference_id":"1447743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1447743"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3139","reference_id":"CVE-2017-3139","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1202","reference_id":"RHSA-2017:1202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1582","reference_id":"RHSA-2017:1582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1582"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-3139"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k4qv-8ggs-afef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/103706?format=json","vulnerability_id":"VCID-kbgt-7v61-1yg7","summary":"BIND 8.x through 8.3.3 allows remote attackers to cause a denial of service (crash) via SIG RR elements with invalid expiry times, which are removed from the internal BIND database and later cause a null dereference.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1221","reference_id":"","reference_type":"","scores":[{"value":"0.04297","scoring_system":"epss","scoring_elements":"0.88816","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04297","scoring_system":"epss","scoring_elements":"0.88825","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04297","scoring_system":"epss","scoring_elements":"0.88841","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04297","scoring_system":"epss","scoring_elements":"0.88843","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04297","scoring_system":"epss","scoring_elements":"0.8886","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04297","scoring_system":"epss","scoring_elements":"0.88866","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04297","scoring_system":"epss","scoring_elements":"0.88877","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04297","scoring_system":"epss","scoring_elements":"0.88872","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1221"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2002-1221"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbgt-7v61-1yg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59044?format=json","vulnerability_id":"VCID-mfgj-p39v-3kgg","summary":"A vulnerability in BIND could lead to a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5986.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5986.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5986","reference_id":"","reference_type":"","scores":[{"value":"0.47991","scoring_system":"epss","scoring_elements":"0.97699","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47991","scoring_system":"epss","scoring_elements":"0.97705","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47991","scoring_system":"epss","scoring_elements":"0.97707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47991","scoring_system":"epss","scoring_elements":"0.97706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47991","scoring_system":"epss","scoring_elements":"0.97711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47991","scoring_system":"epss","scoring_elements":"0.97714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47991","scoring_system":"epss","scoring_elements":"0.97717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47991","scoring_system":"epss","scoring_elements":"0.97719","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47991","scoring_system":"epss","scoring_elements":"0.9772","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5986"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1259085","reference_id":"1259085","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1259085"},{"reference_url":"https://security.gentoo.org/glsa/201510-01","reference_id":"GLSA-201510-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2015-5986"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfgj-p39v-3kgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62342?format=json","vulnerability_id":"VCID-mm57-1mhd-vue9","summary":"Incomplete verification of RSA and DSA certificates might lead to spoofed\n    records authenticated using DNSSEC.","references":[{"reference_url":"http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33","reference_id":"","reference_type":"","scores":[],"url":"http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0265.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0265.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0265","reference_id":"","reference_type":"","scores":[{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60061","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60078","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.59935","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60037","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60008","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60058","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60072","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60093","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0265"},{"reference_url":"http://secunia.com/advisories/33559","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33559"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362"},{"reference_url":"https://www.isc.org/node/373","reference_id":"","reference_type":"","scores":[],"url":"https://www.isc.org/node/373"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:037","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:037"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0043","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0043"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0265","reference_id":"CVE-2009-0265","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0265"},{"reference_url":"https://security.gentoo.org/glsa/200903-14","reference_id":"GLSA-200903-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-14"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2009-0265"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mm57-1mhd-vue9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85403?format=json","vulnerability_id":"VCID-n1bd-y84g-77ae","summary":"bind: race condition when handling socket errors can lead to an assertion failure in resolver.c","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174145.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174145.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174252.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174252.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8461.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8461.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8461","reference_id":"","reference_type":"","scores":[{"value":"0.08096","scoring_system":"epss","scoring_elements":"0.92158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08096","scoring_system":"epss","scoring_elements":"0.9212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08096","scoring_system":"epss","scoring_elements":"0.92127","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08096","scoring_system":"epss","scoring_elements":"0.92134","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08096","scoring_system":"epss","scoring_elements":"0.92138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08096","scoring_system":"epss","scoring_elements":"0.9215","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08096","scoring_system":"epss","scoring_elements":"0.92153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08096","scoring_system":"epss","scoring_elements":"0.92157","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8461"},{"reference_url":"https://kb.isc.org/article/AA-01319","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01319"},{"reference_url":"https://kb.isc.org/article/AA-01380","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01380"},{"reference_url":"https://kb.isc.org/article/AA-01438","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01438"},{"reference_url":"http://www.securityfocus.com/bid/79347","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79347"},{"reference_url":"http://www.securitytracker.com/id/1034419","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034419"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291186","reference_id":"1291186","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291186"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:8.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.7:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.7:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.7:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8461","reference_id":"CVE-2015-8461","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8461"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8461"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1bd-y84g-77ae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69524?format=json","vulnerability_id":"VCID-nw9j-ggq9-uqaq","summary":"bind: DNS message with invalid TSIG causes an assertion failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40775.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40775","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39845","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39873","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39896","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40775"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367442","reference_id":"2367442","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367442"},{"reference_url":"https://security.archlinux.org/ASA-202505-14","reference_id":"ASA-202505-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-14"},{"reference_url":"https://security.archlinux.org/AVG-2881","reference_id":"AVG-2881","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2881"},{"reference_url":"https://kb.isc.org/docs/cve-2025-40775","reference_id":"cve-2025-40775","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-21T13:19:58Z/"}],"url":"https://kb.isc.org/docs/cve-2025-40775"},{"reference_url":"https://usn.ubuntu.com/7526-1/","reference_id":"USN-7526-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7526-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584176?format=json","purl":"pkg:deb/debian/bind9@1:9.20.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-40775"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nw9j-ggq9-uqaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82503?format=json","vulnerability_id":"VCID-pgxv-tnvp-pkb7","summary":"bind: an error in the EDNS Client Subnet (ECS) feature for recursive resolvers can cause BIND to exit with an assertion failure leading to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6469.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6469.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6469","reference_id":"","reference_type":"","scores":[{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77546","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77552","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77589","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6469"},{"reference_url":"https://kb.isc.org/docs/cve-2019-6469","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/cve-2019-6469"},{"reference_url":"https://support.f5.com/csp/article/K39751401?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K39751401?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1715352","reference_id":"1715352","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1715352"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6469","reference_id":"CVE-2019-6469","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6469"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2019-6469"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pgxv-tnvp-pkb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77746?format=json","vulnerability_id":"VCID-pxq6-e945-wqen","summary":"bind9: Cleaning an ECS-enabled cache may cause excessive CPU load","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5680.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5680.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5680","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28691","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5680"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2264285","reference_id":"2264285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2264285"},{"reference_url":"https://kb.isc.org/docs/cve-2023-5680","reference_id":"cve-2023-5680","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T18:02:52Z/"}],"url":"https://kb.isc.org/docs/cve-2023-5680"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240503-0005/","reference_id":"ntap-20240503-0005","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T18:02:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240503-0005/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2023-5680"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pxq6-e945-wqen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31458?format=json","vulnerability_id":"VCID-pywd-4rnk-dfhw","summary":"Multiple vulnerabilities have been found in BIND, the worst of\n    which could cause a Denial of Service condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176564.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176564.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175977.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175977.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8705.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8705","reference_id":"","reference_type":"","scores":[{"value":"0.29069","scoring_system":"epss","scoring_elements":"0.96579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29069","scoring_system":"epss","scoring_elements":"0.96577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.29069","scoring_system":"epss","scoring_elements":"0.96546","published_at":"2026-04-01T12:55:00Z"},{"value":"0.29069","scoring_system":"epss","scoring_elements":"0.96555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.29069","scoring_system":"epss","scoring_elements":"0.9656","published_at":"2026-04-04T12:55:00Z"},{"value":"0.29069","scoring_system":"epss","scoring_elements":"0.96563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.29069","scoring_system":"epss","scoring_elements":"0.96571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29069","scoring_system":"epss","scoring_elements":"0.96574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29069","scoring_system":"epss","scoring_elements":"0.96576","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8705"},{"reference_url":"https://kb.isc.org/article/AA-01336","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01336"},{"reference_url":"https://kb.isc.org/article/AA-01380","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01380"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"},{"reference_url":"http://www.securityfocus.com/bid/81314","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81314"},{"reference_url":"http://www.securitytracker.com/id/1034740","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034740"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299367","reference_id":"1299367","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299367"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.8:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.8:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8705","reference_id":"CVE-2015-8705","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:C"},{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8705"},{"reference_url":"https://security.gentoo.org/glsa/201610-07","reference_id":"GLSA-201610-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8705"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pywd-4rnk-dfhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74684?format=json","vulnerability_id":"VCID-qgwq-kcp2-jqep","summary":"bind: bind9: A flood of DNS messages over TCP may make the server unstable","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0760.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0760.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0760","reference_id":"","reference_type":"","scores":[{"value":"0.1669","scoring_system":"epss","scoring_elements":"0.94935","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1669","scoring_system":"epss","scoring_elements":"0.9491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1669","scoring_system":"epss","scoring_elements":"0.94912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1669","scoring_system":"epss","scoring_elements":"0.94914","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1669","scoring_system":"epss","scoring_elements":"0.94923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1669","scoring_system":"epss","scoring_elements":"0.94926","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1669","scoring_system":"epss","scoring_elements":"0.94931","published_at":"2026-04-11T12:55:00Z"},{"value":"0.1669","scoring_system":"epss","scoring_elements":"0.94933","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0760"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/23/1","reference_id":"1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T16:02:34Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/23/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/31/2","reference_id":"2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T16:02:34Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/31/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298878","reference_id":"2298878","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298878"},{"reference_url":"https://kb.isc.org/docs/cve-2024-0760","reference_id":"cve-2024-0760","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T16:02:34Z/"}],"url":"https://kb.isc.org/docs/cve-2024-0760"},{"reference_url":"https://usn.ubuntu.com/6909-1/","reference_id":"USN-6909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6909-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584101?format=json","purl":"pkg:deb/debian/bind9@1:9.18.28-1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.28-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584102?format=json","purl":"pkg:deb/debian/bind9@1:9.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-0760"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qgwq-kcp2-jqep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79417?format=json","vulnerability_id":"VCID-qhg8-95mf-aufj","summary":"bind: Destroying a TLS session early causes assertion failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1183.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1183","reference_id":"","reference_type":"","scores":[{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60098","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60175","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60201","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6017","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60219","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60234","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60241","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60224","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2087575","reference_id":"2087575","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2087575"},{"reference_url":"https://security.archlinux.org/AVG-2727","reference_id":"AVG-2727","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2727"},{"reference_url":"https://usn.ubuntu.com/5429-1/","reference_id":"USN-5429-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5429-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583921?format=json","purl":"pkg:deb/debian/bind9@1:9.18.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-1183"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qhg8-95mf-aufj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88558?format=json","vulnerability_id":"VCID-qnzx-zj6k-tkhf","summary":"bind: /etc/rndc.key has 644 permissions by default","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6283.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6283","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32345","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32353","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32433","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32395","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32368","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6283"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=419421","reference_id":"419421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=419421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0300","reference_id":"RHSA-2008:0300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0300"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2007-6283"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qnzx-zj6k-tkhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60969?format=json","vulnerability_id":"VCID-qu4k-agb9-rqc7","summary":"Multiple vulnerabilities have been found in BIND, allowing remote\n    attackers to cause a\n    denial of service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8680.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8680.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8680","reference_id":"","reference_type":"","scores":[{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.8462","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.84541","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.84557","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.84579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.84583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.84604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.8461","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.84629","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.84625","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8680"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-03.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-03.xml"},{"reference_url":"https://kb.isc.org/article/AA-01217","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-01217"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190730-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190730-0002/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1171919","reference_id":"1171919","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1171919"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8680","reference_id":"CVE-2014-8680","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8680"},{"reference_url":"https://security.gentoo.org/glsa/201502-03","reference_id":"GLSA-201502-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8680"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qu4k-agb9-rqc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89811?format=json","vulnerability_id":"VCID-rgjg-zw6c-77ad","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0029.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0029","reference_id":"","reference_type":"","scores":[{"value":"0.21847","scoring_system":"epss","scoring_elements":"0.95722","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21847","scoring_system":"epss","scoring_elements":"0.95732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21847","scoring_system":"epss","scoring_elements":"0.95739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21847","scoring_system":"epss","scoring_elements":"0.95742","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21847","scoring_system":"epss","scoring_elements":"0.95751","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21847","scoring_system":"epss","scoring_elements":"0.95754","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21847","scoring_system":"epss","scoring_elements":"0.95757","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21847","scoring_system":"epss","scoring_elements":"0.95758","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0029"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616723","reference_id":"1616723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:383","reference_id":"RHSA-2004:383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:383"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2002-0029"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rgjg-zw6c-77ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63995?format=json","vulnerability_id":"VCID-rvqb-pvb9-w7ht","summary":"bind: BIND: Denial of Service via specially crafted domain query causing a memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3104.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3104","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18601","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18656","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18499","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18452","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3104"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451310","reference_id":"2451310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451310"},{"reference_url":"https://downloads.isc.org/isc/bind9/9.20.21","reference_id":"9.20.21","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:56:20Z/"}],"url":"https://downloads.isc.org/isc/bind9/9.20.21"},{"reference_url":"https://downloads.isc.org/isc/bind9/9.21.20","reference_id":"9.21.20","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:56:20Z/"}],"url":"https://downloads.isc.org/isc/bind9/9.21.20"},{"reference_url":"https://kb.isc.org/docs/cve-2026-3104","reference_id":"cve-2026-3104","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:56:20Z/"}],"url":"https://kb.isc.org/docs/cve-2026-3104"},{"reference_url":"https://usn.ubuntu.com/8124-1/","reference_id":"USN-8124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8124-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584546?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2026-3104"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rvqb-pvb9-w7ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/266485?format=json","vulnerability_id":"VCID-stfg-weu9-3kag","summary":"A `named` caching resolver that is configured to send ECS (EDNS Client Subnet) options may be vulnerable to a cache-poisoning attack.\nThis issue affects BIND 9 versions 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.37-S1, and 9.20.9-S1 through 9.20.10-S1.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40776","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02278","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02946","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02978","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02954","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40776"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kb.isc.org/docs/cve-2025-40776","reference_id":"cve-2025-40776","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-22T14:54:56Z/"}],"url":"https://kb.isc.org/docs/cve-2025-40776"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-40776"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-stfg-weu9-3kag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/103704?format=json","vulnerability_id":"VCID-sy8n-7mhn-1be7","summary":"BIND 8.3.x through 8.3.3 allows remote attackers to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1220","reference_id":"","reference_type":"","scores":[{"value":"0.32686","scoring_system":"epss","scoring_elements":"0.96841","published_at":"2026-04-01T12:55:00Z"},{"value":"0.32686","scoring_system":"epss","scoring_elements":"0.96849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.32686","scoring_system":"epss","scoring_elements":"0.96851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.32686","scoring_system":"epss","scoring_elements":"0.96856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.32686","scoring_system":"epss","scoring_elements":"0.96865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.32686","scoring_system":"epss","scoring_elements":"0.96866","published_at":"2026-04-09T12:55:00Z"},{"value":"0.32686","scoring_system":"epss","scoring_elements":"0.96869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.32686","scoring_system":"epss","scoring_elements":"0.9687","published_at":"2026-04-12T12:55:00Z"},{"value":"0.32686","scoring_system":"epss","scoring_elements":"0.96871","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1220"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/22011.c","reference_id":"CVE-2002-1220;OSVDB-9724","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/22011.c"},{"reference_url":"https://www.securityfocus.com/bid/6161/info","reference_id":"CVE-2002-1220;OSVDB-9724","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/6161/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2002-1220"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sy8n-7mhn-1be7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48064?format=json","vulnerability_id":"VCID-t4dn-73sn-57c1","summary":"Multiple vulnerabilities have been found in BIND, the worst of\n    which allows remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3140.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3140.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3140","reference_id":"","reference_type":"","scores":[{"value":"0.19519","scoring_system":"epss","scoring_elements":"0.95366","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19519","scoring_system":"epss","scoring_elements":"0.95403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19519","scoring_system":"epss","scoring_elements":"0.95375","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19519","scoring_system":"epss","scoring_elements":"0.95382","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19519","scoring_system":"epss","scoring_elements":"0.95386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19519","scoring_system":"epss","scoring_elements":"0.95393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19519","scoring_system":"epss","scoring_elements":"0.95395","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19519","scoring_system":"epss","scoring_elements":"0.95401","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3140"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us"},{"reference_url":"https://kb.isc.org/docs/aa-01495","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/aa-01495"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180926-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180926-0001/"},{"reference_url":"http://www.securityfocus.com/bid/99088","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/99088"},{"reference_url":"http://www.securitytracker.com/id/1038692","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038692"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1461302","reference_id":"1461302","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1461302"},{"reference_url":"https://security.archlinux.org/ASA-201706-18","reference_id":"ASA-201706-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-18"},{"reference_url":"https://security.archlinux.org/AVG-301","reference_id":"AVG-301","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-301"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:s1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.9.10:s1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.9.10:s1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3140","reference_id":"CVE-2017-3140","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3140"},{"reference_url":"https://security.gentoo.org/glsa/201708-01","reference_id":"GLSA-201708-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201708-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-3140"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t4dn-73sn-57c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86509?format=json","vulnerability_id":"VCID-tf4h-qdz8-fuau","summary":"bind: localnets ACL bypass caused by WinSock API bug","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6230.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6230","reference_id":"","reference_type":"","scores":[{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77549","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.7761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77609","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6230"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1027689","reference_id":"1027689","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1027689"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6230"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tf4h-qdz8-fuau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/103703?format=json","vulnerability_id":"VCID-ubru-w77c-87dv","summary":"Buffer overflow in named in BIND 4 versions 4.9.10 and earlier, and 8 versions 8.3.3 and earlier, allows remote attackers to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1219","reference_id":"","reference_type":"","scores":[{"value":"0.10367","scoring_system":"epss","scoring_elements":"0.93174","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10367","scoring_system":"epss","scoring_elements":"0.93184","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10367","scoring_system":"epss","scoring_elements":"0.93188","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10367","scoring_system":"epss","scoring_elements":"0.93186","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10367","scoring_system":"epss","scoring_elements":"0.93195","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10367","scoring_system":"epss","scoring_elements":"0.93199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10367","scoring_system":"epss","scoring_elements":"0.93203","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10367","scoring_system":"epss","scoring_elements":"0.93201","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10367","scoring_system":"epss","scoring_elements":"0.93202","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1219"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2002-1219"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubru-w77c-87dv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60968?format=json","vulnerability_id":"VCID-v3z3-e53d-mbcu","summary":"Multiple vulnerabilities have been found in BIND, allowing remote\n    attackers to cause a\n    denial of service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3214.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3214","reference_id":"","reference_type":"","scores":[{"value":"0.11256","scoring_system":"epss","scoring_elements":"0.9348","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11256","scoring_system":"epss","scoring_elements":"0.93489","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11256","scoring_system":"epss","scoring_elements":"0.93496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11256","scoring_system":"epss","scoring_elements":"0.93504","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11256","scoring_system":"epss","scoring_elements":"0.93507","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11256","scoring_system":"epss","scoring_elements":"0.93512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11256","scoring_system":"epss","scoring_elements":"0.93511","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3214"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1096016","reference_id":"1096016","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1096016"},{"reference_url":"https://security.gentoo.org/glsa/201502-03","reference_id":"GLSA-201502-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-3214"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v3z3-e53d-mbcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83640?format=json","vulnerability_id":"VCID-w7hs-jqc1-qqa9","summary":"bind: A malformed request can trigger an assertion failure in badcache.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5734.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5734","reference_id":"","reference_type":"","scores":[{"value":"0.06399","scoring_system":"epss","scoring_elements":"0.9098","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06399","scoring_system":"epss","scoring_elements":"0.9103","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06399","scoring_system":"epss","scoring_elements":"0.91022","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06399","scoring_system":"epss","scoring_elements":"0.91031","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06399","scoring_system":"epss","scoring_elements":"0.90985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06399","scoring_system":"epss","scoring_elements":"0.90994","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06399","scoring_system":"epss","scoring_elements":"0.91004","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06399","scoring_system":"epss","scoring_elements":"0.91017","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5734"},{"reference_url":"https://kb.isc.org/docs/aa-01562","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/aa-01562"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180926-0005/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180926-0005/"},{"reference_url":"http://www.securityfocus.com/bid/103189","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/103189"},{"reference_url":"http://www.securitytracker.com/id/1040438","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040438"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550602","reference_id":"1550602","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550602"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.5:s4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.10.6:s2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5734","reference_id":"CVE-2018-5734","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5734"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2018-5734"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w7hs-jqc1-qqa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78328?format=json","vulnerability_id":"VCID-wcf1-sy8g-27dw","summary":"bind: DNSSEC-Validated cache can be remotely terminated with malformed NSEC record","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2829.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2829","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21952","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21983","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22038","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22052","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22011","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22127","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2829"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2216581","reference_id":"2216581","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2216581"},{"reference_url":"https://kb.isc.org/docs/cve-2023-2829","reference_id":"cve-2023-2829","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:34:26Z/"}],"url":"https://kb.isc.org/docs/cve-2023-2829"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230703-0010/","reference_id":"ntap-20230703-0010","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:34:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230703-0010/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2023-2829"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wcf1-sy8g-27dw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48065?format=json","vulnerability_id":"VCID-wpmu-g3xw-u7cs","summary":"Multiple vulnerabilities have been found in BIND, the worst of\n    which allows remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3141.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3141","reference_id":"","reference_type":"","scores":[{"value":"0.03103","scoring_system":"epss","scoring_elements":"0.86747","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03103","scoring_system":"epss","scoring_elements":"0.86808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03103","scoring_system":"epss","scoring_elements":"0.86803","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03103","scoring_system":"epss","scoring_elements":"0.86816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03103","scoring_system":"epss","scoring_elements":"0.86813","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03103","scoring_system":"epss","scoring_elements":"0.86758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03103","scoring_system":"epss","scoring_elements":"0.86777","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03103","scoring_system":"epss","scoring_elements":"0.86775","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03103","scoring_system":"epss","scoring_elements":"0.86794","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3141"},{"reference_url":"https://kb.isc.org/docs/aa-01496","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/docs/aa-01496"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180926-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180926-0001/"},{"reference_url":"https://www.exploit-db.com/exploits/42121/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/42121/"},{"reference_url":"http://www.securityfocus.com/bid/99089","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/99089"},{"reference_url":"http://www.securitytracker.com/id/1038693","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038693"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1461310","reference_id":"1461310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1461310"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.6:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.6:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.3.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.3.2:p1:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42121.txt","reference_id":"CVE-2017-3141","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42121.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3141","reference_id":"CVE-2017-3141","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3141"},{"reference_url":"https://security.gentoo.org/glsa/201708-01","reference_id":"GLSA-201708-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201708-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-3141"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpmu-g3xw-u7cs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79581?format=json","vulnerability_id":"VCID-x4bu-4ex7-37cd","summary":"bind: Lookups involving a DNAME could trigger an assertion failure when 'synth-from-dnssec' was enabled (which is the default)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0635.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0635","reference_id":"","reference_type":"","scores":[{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73649","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73697","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73724","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73706","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73658","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.7369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73703","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0635"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2064514","reference_id":"2064514","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2064514"},{"reference_url":"https://security.archlinux.org/ASA-202204-5","reference_id":"ASA-202204-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202204-5"},{"reference_url":"https://security.archlinux.org/AVG-2661","reference_id":"AVG-2661","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2661"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584960?format=json","purl":"pkg:deb/debian/bind9@1:9.18.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-0635"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x4bu-4ex7-37cd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80079?format=json","vulnerability_id":"VCID-x9g2-pnfe-qyhh","summary":"bind: Too strict assertion check could be triggered when responses require UDP fragmentation if RRL is in use","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25218.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25218","reference_id":"","reference_type":"","scores":[{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.68945","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.6901","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.69054","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.6904","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.68963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.68983","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.68962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.69013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.69032","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25218"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1995312","reference_id":"1995312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1995312"},{"reference_url":"https://security.archlinux.org/AVG-2303","reference_id":"AVG-2303","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2303"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582321?format=json","purl":"pkg:deb/debian/bind9@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582322?format=json","purl":"pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"},{"vulnerability":"VCID-gdhz-6yzf-afda"},{"vulnerability":"VCID-unqt-mcxv-c7fw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582323?format=json","purl":"pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d9np-47r3-rkg1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582324?format=json","purl":"pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582325?format=json","purl":"pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921541?format=json","purl":"pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie"}],"aliases":["CVE-2021-25218"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x9g2-pnfe-qyhh"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie"}