Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/bind9@1:9.18.41-1~deb12u1
Typedeb
Namespacedebian
Namebind9
Version1:9.18.41-1~deb12u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1:9.18.47-1~deb12u1
Latest_non_vulnerable_version1:9.18.47-1~deb12u1
Affected_by_vulnerabilities
0
url VCID-d9np-47r3-rkg1
vulnerability_id VCID-d9np-47r3-rkg1
summary bind: bind assertion failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40777.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-40777
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04185
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04222
published_at 2026-04-07T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04206
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06265
published_at 2026-04-08T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06306
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07234
published_at 2026-04-12T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07224
published_at 2026-04-13T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07247
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-40777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40777
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2381418
reference_id 2381418
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2381418
5
reference_url https://kb.isc.org/docs/cve-2025-40777
reference_id cve-2025-40777
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-18T14:25:41Z/
url https://kb.isc.org/docs/cve-2025-40777
6
reference_url https://usn.ubuntu.com/7641-1/
reference_id USN-7641-1
reference_type
scores
url https://usn.ubuntu.com/7641-1/
fixed_packages
0
url pkg:deb/debian/bind9@1:9.18.47-1~deb12u1
purl pkg:deb/debian/bind9@1:9.18.47-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.47-1~deb12u1
aliases CVE-2025-40777
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d9np-47r3-rkg1
Fixing_vulnerabilities
0
url VCID-2s8x-my3p-c7bd
vulnerability_id VCID-2s8x-my3p-c7bd
summary bind: Cache poisoning due to weak PRNG
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40780.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-40780
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06472
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06559
published_at 2026-04-13T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06582
published_at 2026-04-09T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06576
published_at 2026-04-11T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06568
published_at 2026-04-12T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.065
published_at 2026-04-04T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06491
published_at 2026-04-07T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06541
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-40780
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40780
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2405829
reference_id 2405829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2405829
5
reference_url https://kb.isc.org/docs/cve-2025-40780
reference_id cve-2025-40780
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-22T17:27:36Z/
url https://kb.isc.org/docs/cve-2025-40780
6
reference_url https://access.redhat.com/errata/RHSA-2025:19793
reference_id RHSA-2025:19793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19793
7
reference_url https://access.redhat.com/errata/RHSA-2025:19912
reference_id RHSA-2025:19912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19912
8
reference_url https://access.redhat.com/errata/RHSA-2025:19950
reference_id RHSA-2025:19950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19950
9
reference_url https://access.redhat.com/errata/RHSA-2025:19951
reference_id RHSA-2025:19951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19951
10
reference_url https://access.redhat.com/errata/RHSA-2025:21034
reference_id RHSA-2025:21034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21034
11
reference_url https://access.redhat.com/errata/RHSA-2025:21110
reference_id RHSA-2025:21110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21110
12
reference_url https://access.redhat.com/errata/RHSA-2025:21111
reference_id RHSA-2025:21111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21111
13
reference_url https://access.redhat.com/errata/RHSA-2025:21817
reference_id RHSA-2025:21817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21817
14
reference_url https://access.redhat.com/errata/RHSA-2025:21887
reference_id RHSA-2025:21887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21887
15
reference_url https://access.redhat.com/errata/RHSA-2025:21889
reference_id RHSA-2025:21889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21889
16
reference_url https://access.redhat.com/errata/RHSA-2025:21939
reference_id RHSA-2025:21939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21939
17
reference_url https://access.redhat.com/errata/RHSA-2025:21994
reference_id RHSA-2025:21994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21994
18
reference_url https://access.redhat.com/errata/RHSA-2025:22168
reference_id RHSA-2025:22168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22168
19
reference_url https://access.redhat.com/errata/RHSA-2026:0326
reference_id RHSA-2026:0326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0326
20
reference_url https://access.redhat.com/errata/RHSA-2026:0332
reference_id RHSA-2026:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0332
21
reference_url https://access.redhat.com/errata/RHSA-2026:0420
reference_id RHSA-2026:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0420
22
reference_url https://access.redhat.com/errata/RHSA-2026:0674
reference_id RHSA-2026:0674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0674
23
reference_url https://access.redhat.com/errata/RHSA-2026:0677
reference_id RHSA-2026:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0677
24
reference_url https://access.redhat.com/errata/RHSA-2026:0702
reference_id RHSA-2026:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0702
25
reference_url https://access.redhat.com/errata/RHSA-2026:0996
reference_id RHSA-2026:0996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0996
26
reference_url https://access.redhat.com/errata/RHSA-2026:1541
reference_id RHSA-2026:1541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1541
27
reference_url https://usn.ubuntu.com/7836-1/
reference_id USN-7836-1
reference_type
scores
url https://usn.ubuntu.com/7836-1/
28
reference_url https://usn.ubuntu.com/7836-2/
reference_id USN-7836-2
reference_type
scores
url https://usn.ubuntu.com/7836-2/
fixed_packages
0
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
aliases CVE-2025-40780
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2s8x-my3p-c7bd
1
url VCID-7swx-af28-yqaw
vulnerability_id VCID-7swx-af28-yqaw
summary bind: Cache poisoning attacks with unsolicited RRs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40778.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-40778
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00243
published_at 2026-04-04T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00235
published_at 2026-04-13T12:55:00Z
2
value 5e-05
scoring_system epss
scoring_elements 0.00238
published_at 2026-04-08T12:55:00Z
3
value 5e-05
scoring_system epss
scoring_elements 0.00237
published_at 2026-04-11T12:55:00Z
4
value 5e-05
scoring_system epss
scoring_elements 0.00236
published_at 2026-04-12T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.00241
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-40778
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2405827
reference_id 2405827
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2405827
5
reference_url https://kb.isc.org/docs/cve-2025-40778
reference_id cve-2025-40778
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-07T04:56:12Z/
url https://kb.isc.org/docs/cve-2025-40778
6
reference_url https://access.redhat.com/errata/RHSA-2025:19793
reference_id RHSA-2025:19793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19793
7
reference_url https://access.redhat.com/errata/RHSA-2025:19835
reference_id RHSA-2025:19835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19835
8
reference_url https://access.redhat.com/errata/RHSA-2025:19912
reference_id RHSA-2025:19912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19912
9
reference_url https://access.redhat.com/errata/RHSA-2025:19950
reference_id RHSA-2025:19950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19950
10
reference_url https://access.redhat.com/errata/RHSA-2025:19951
reference_id RHSA-2025:19951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19951
11
reference_url https://access.redhat.com/errata/RHSA-2025:21034
reference_id RHSA-2025:21034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21034
12
reference_url https://access.redhat.com/errata/RHSA-2025:21110
reference_id RHSA-2025:21110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21110
13
reference_url https://access.redhat.com/errata/RHSA-2025:21111
reference_id RHSA-2025:21111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21111
14
reference_url https://access.redhat.com/errata/RHSA-2025:21735
reference_id RHSA-2025:21735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21735
15
reference_url https://access.redhat.com/errata/RHSA-2025:21736
reference_id RHSA-2025:21736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21736
16
reference_url https://access.redhat.com/errata/RHSA-2025:21740
reference_id RHSA-2025:21740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21740
17
reference_url https://access.redhat.com/errata/RHSA-2025:21741
reference_id RHSA-2025:21741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21741
18
reference_url https://access.redhat.com/errata/RHSA-2025:21817
reference_id RHSA-2025:21817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21817
19
reference_url https://access.redhat.com/errata/RHSA-2025:21887
reference_id RHSA-2025:21887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21887
20
reference_url https://access.redhat.com/errata/RHSA-2025:21889
reference_id RHSA-2025:21889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21889
21
reference_url https://access.redhat.com/errata/RHSA-2025:21939
reference_id RHSA-2025:21939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21939
22
reference_url https://access.redhat.com/errata/RHSA-2025:21994
reference_id RHSA-2025:21994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21994
23
reference_url https://access.redhat.com/errata/RHSA-2025:22168
reference_id RHSA-2025:22168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22168
24
reference_url https://access.redhat.com/errata/RHSA-2025:22205
reference_id RHSA-2025:22205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22205
25
reference_url https://access.redhat.com/errata/RHSA-2025:23414
reference_id RHSA-2025:23414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23414
26
reference_url https://access.redhat.com/errata/RHSA-2026:0326
reference_id RHSA-2026:0326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0326
27
reference_url https://access.redhat.com/errata/RHSA-2026:0332
reference_id RHSA-2026:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0332
28
reference_url https://access.redhat.com/errata/RHSA-2026:0420
reference_id RHSA-2026:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0420
29
reference_url https://access.redhat.com/errata/RHSA-2026:0674
reference_id RHSA-2026:0674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0674
30
reference_url https://access.redhat.com/errata/RHSA-2026:0677
reference_id RHSA-2026:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0677
31
reference_url https://access.redhat.com/errata/RHSA-2026:0702
reference_id RHSA-2026:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0702
32
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
33
reference_url https://access.redhat.com/errata/RHSA-2026:0996
reference_id RHSA-2026:0996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0996
34
reference_url https://access.redhat.com/errata/RHSA-2026:1541
reference_id RHSA-2026:1541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1541
35
reference_url https://usn.ubuntu.com/7836-1/
reference_id USN-7836-1
reference_type
scores
url https://usn.ubuntu.com/7836-1/
36
reference_url https://usn.ubuntu.com/7836-2/
reference_id USN-7836-2
reference_type
scores
url https://usn.ubuntu.com/7836-2/
fixed_packages
0
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
aliases CVE-2025-40778
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7swx-af28-yqaw
2
url VCID-auju-9h98-xkd1
vulnerability_id VCID-auju-9h98-xkd1
summary bind: Resource exhaustion via malformed DNSKEY handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8677.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8677.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-8677
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19421
published_at 2026-04-02T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24392
published_at 2026-04-13T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24479
published_at 2026-04-09T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24494
published_at 2026-04-11T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.2445
published_at 2026-04-12T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24588
published_at 2026-04-04T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24366
published_at 2026-04-07T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24435
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-8677
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8677
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2405830
reference_id 2405830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2405830
5
reference_url https://kb.isc.org/docs/cve-2025-8677
reference_id cve-2025-8677
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-22T17:29:14Z/
url https://kb.isc.org/docs/cve-2025-8677
6
reference_url https://access.redhat.com/errata/RHSA-2025:19912
reference_id RHSA-2025:19912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19912
7
reference_url https://access.redhat.com/errata/RHSA-2025:19950
reference_id RHSA-2025:19950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19950
8
reference_url https://access.redhat.com/errata/RHSA-2025:21034
reference_id RHSA-2025:21034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21034
9
reference_url https://access.redhat.com/errata/RHSA-2025:21111
reference_id RHSA-2025:21111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21111
10
reference_url https://access.redhat.com/errata/RHSA-2025:21994
reference_id RHSA-2025:21994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21994
11
reference_url https://access.redhat.com/errata/RHSA-2026:0326
reference_id RHSA-2026:0326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0326
12
reference_url https://access.redhat.com/errata/RHSA-2026:0332
reference_id RHSA-2026:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0332
13
reference_url https://access.redhat.com/errata/RHSA-2026:0420
reference_id RHSA-2026:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0420
14
reference_url https://access.redhat.com/errata/RHSA-2026:0674
reference_id RHSA-2026:0674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0674
15
reference_url https://access.redhat.com/errata/RHSA-2026:0677
reference_id RHSA-2026:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0677
16
reference_url https://access.redhat.com/errata/RHSA-2026:0702
reference_id RHSA-2026:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0702
17
reference_url https://access.redhat.com/errata/RHSA-2026:0996
reference_id RHSA-2026:0996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0996
18
reference_url https://access.redhat.com/errata/RHSA-2026:1541
reference_id RHSA-2026:1541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1541
19
reference_url https://usn.ubuntu.com/7836-1/
reference_id USN-7836-1
reference_type
scores
url https://usn.ubuntu.com/7836-1/
20
reference_url https://usn.ubuntu.com/7836-2/
reference_id USN-7836-2
reference_type
scores
url https://usn.ubuntu.com/7836-2/
fixed_packages
0
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
aliases CVE-2025-8677
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-auju-9h98-xkd1
3
url VCID-gdhz-6yzf-afda
vulnerability_id VCID-gdhz-6yzf-afda
summary Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2881.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2881.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2881
reference_id
reference_type
scores
0
value 0.03291
scoring_system epss
scoring_elements 0.8716
published_at 2026-04-02T12:55:00Z
1
value 0.03291
scoring_system epss
scoring_elements 0.87203
published_at 2026-04-13T12:55:00Z
2
value 0.03291
scoring_system epss
scoring_elements 0.87177
published_at 2026-04-04T12:55:00Z
3
value 0.03291
scoring_system epss
scoring_elements 0.87174
published_at 2026-04-07T12:55:00Z
4
value 0.03291
scoring_system epss
scoring_elements 0.87195
published_at 2026-04-08T12:55:00Z
5
value 0.03291
scoring_system epss
scoring_elements 0.87202
published_at 2026-04-09T12:55:00Z
6
value 0.03291
scoring_system epss
scoring_elements 0.87214
published_at 2026-04-11T12:55:00Z
7
value 0.03291
scoring_system epss
scoring_elements 0.87207
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2881
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2881
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2128594
reference_id 2128594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2128594
5
reference_url http://www.openwall.com/lists/oss-security/2022/09/21/3
reference_id 3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:26:29Z/
url http://www.openwall.com/lists/oss-security/2022/09/21/3
6
reference_url https://kb.isc.org/docs/cve-2022-2881
reference_id cve-2022-2881
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:26:29Z/
url https://kb.isc.org/docs/cve-2022-2881
7
reference_url https://security.gentoo.org/glsa/202210-25
reference_id GLSA-202210-25
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:26:29Z/
url https://security.gentoo.org/glsa/202210-25
8
reference_url https://usn.ubuntu.com/5626-1/
reference_id USN-5626-1
reference_type
scores
url https://usn.ubuntu.com/5626-1/
fixed_packages
0
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
aliases CVE-2022-2881
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gdhz-6yzf-afda
4
url VCID-unqt-mcxv-c7fw
vulnerability_id VCID-unqt-mcxv-c7fw
summary bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1519.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1519.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1519
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20746
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20636
published_at 2026-04-12T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20679
published_at 2026-04-11T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20659
published_at 2026-04-09T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.206
published_at 2026-04-08T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20805
published_at 2026-04-04T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20523
published_at 2026-04-07T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25811
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1519
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1519
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451305
reference_id 2451305
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2451305
5
reference_url https://downloads.isc.org/isc/bind9/9.18.47
reference_id 9.18.47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/
url https://downloads.isc.org/isc/bind9/9.18.47
6
reference_url https://downloads.isc.org/isc/bind9/9.20.21
reference_id 9.20.21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/
url https://downloads.isc.org/isc/bind9/9.20.21
7
reference_url https://downloads.isc.org/isc/bind9/9.21.20
reference_id 9.21.20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/
url https://downloads.isc.org/isc/bind9/9.21.20
8
reference_url https://kb.isc.org/docs/cve-2026-1519
reference_id cve-2026-1519
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/
url https://kb.isc.org/docs/cve-2026-1519
9
reference_url https://usn.ubuntu.com/8124-1/
reference_id USN-8124-1
reference_type
scores
url https://usn.ubuntu.com/8124-1/
fixed_packages
0
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
aliases CVE-2026-1519
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unqt-mcxv-c7fw
5
url VCID-xz18-c263-nyap
vulnerability_id VCID-xz18-c263-nyap
summary bind: bind9: Many records in the additional section cause CPU exhaustion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11187.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11187
reference_id
reference_type
scores
0
value 0.04069
scoring_system epss
scoring_elements 0.88542
published_at 2026-04-13T12:55:00Z
1
value 0.04069
scoring_system epss
scoring_elements 0.88534
published_at 2026-04-08T12:55:00Z
2
value 0.04069
scoring_system epss
scoring_elements 0.88539
published_at 2026-04-09T12:55:00Z
3
value 0.04069
scoring_system epss
scoring_elements 0.8855
published_at 2026-04-11T12:55:00Z
4
value 0.04069
scoring_system epss
scoring_elements 0.88495
published_at 2026-04-02T12:55:00Z
5
value 0.04069
scoring_system epss
scoring_elements 0.88512
published_at 2026-04-04T12:55:00Z
6
value 0.04069
scoring_system epss
scoring_elements 0.88515
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094735
reference_id 1094735
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094735
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2342879
reference_id 2342879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2342879
6
reference_url https://kb.isc.org/docs/cve-2024-11187
reference_id cve-2024-11187
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T15:27:46Z/
url https://kb.isc.org/docs/cve-2024-11187
7
reference_url https://access.redhat.com/errata/RHSA-2025:1664
reference_id RHSA-2025:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1664
8
reference_url https://access.redhat.com/errata/RHSA-2025:1665
reference_id RHSA-2025:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1665
9
reference_url https://access.redhat.com/errata/RHSA-2025:1666
reference_id RHSA-2025:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1666
10
reference_url https://access.redhat.com/errata/RHSA-2025:1669
reference_id RHSA-2025:1669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1669
11
reference_url https://access.redhat.com/errata/RHSA-2025:1670
reference_id RHSA-2025:1670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1670
12
reference_url https://access.redhat.com/errata/RHSA-2025:1674
reference_id RHSA-2025:1674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1674
13
reference_url https://access.redhat.com/errata/RHSA-2025:1675
reference_id RHSA-2025:1675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1675
14
reference_url https://access.redhat.com/errata/RHSA-2025:1676
reference_id RHSA-2025:1676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1676
15
reference_url https://access.redhat.com/errata/RHSA-2025:1678
reference_id RHSA-2025:1678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1678
16
reference_url https://access.redhat.com/errata/RHSA-2025:1679
reference_id RHSA-2025:1679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1679
17
reference_url https://access.redhat.com/errata/RHSA-2025:1681
reference_id RHSA-2025:1681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1681
18
reference_url https://access.redhat.com/errata/RHSA-2025:1684
reference_id RHSA-2025:1684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1684
19
reference_url https://access.redhat.com/errata/RHSA-2025:1685
reference_id RHSA-2025:1685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1685
20
reference_url https://access.redhat.com/errata/RHSA-2025:1687
reference_id RHSA-2025:1687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1687
21
reference_url https://access.redhat.com/errata/RHSA-2025:1691
reference_id RHSA-2025:1691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1691
22
reference_url https://access.redhat.com/errata/RHSA-2025:1718
reference_id RHSA-2025:1718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1718
23
reference_url https://access.redhat.com/errata/RHSA-2025:1907
reference_id RHSA-2025:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1907
24
reference_url https://access.redhat.com/errata/RHSA-2025:1912
reference_id RHSA-2025:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1912
25
reference_url https://access.redhat.com/errata/RHSA-2025:2588
reference_id RHSA-2025:2588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2588
26
reference_url https://access.redhat.com/errata/RHSA-2025:3775
reference_id RHSA-2025:3775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3775
27
reference_url https://usn.ubuntu.com/7241-1/
reference_id USN-7241-1
reference_type
scores
url https://usn.ubuntu.com/7241-1/
fixed_packages
0
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1
aliases CVE-2024-11187
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xz18-c263-nyap
Risk_score2.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1