{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","type":"ebuild","namespace":"net-misc","name":"dhcp","version":"4.2.4_p2","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.2.5_p1","latest_non_vulnerable_version":"4.4.3_p1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35812?format=json","vulnerability_id":"VCID-1uby-b9re-hqg2","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4539.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4539","reference_id":"","reference_type":"","scores":[{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96279","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96287","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96309","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96311","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96316","published_at":"2026-04-11T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96315","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96318","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96332","published_at":"2026-04-18T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96333","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26428","scoring_system":"epss","scoring_elements":"0.96335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.32265","scoring_system":"epss","scoring_elements":"0.96853","published_at":"2026-04-29T12:55:00Z"},{"value":"0.32265","scoring_system":"epss","scoring_elements":"0.96859","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652259","reference_id":"652259","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652259"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=761265","reference_id":"761265","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=761265"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1819","reference_id":"RHSA-2011:1819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1819"},{"reference_url":"https://usn.ubuntu.com/1309-1/","reference_id":"USN-1309-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1309-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}],"aliases":["CVE-2011-4539"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1uby-b9re-hqg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35813?format=json","vulnerability_id":"VCID-5v14-pk3f-7ye1","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4868.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4868","reference_id":"","reference_type":"","scores":[{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74767","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.7477","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74797","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74771","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74804","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74855","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74845","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74888","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74892","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74898","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655746","reference_id":"655746","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655746"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=781242","reference_id":"781242","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=781242"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}],"aliases":["CVE-2011-4868"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5v14-pk3f-7ye1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35819?format=json","vulnerability_id":"VCID-b2gd-p3qx-37eh","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3954.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3954","reference_id":"","reference_type":"","scores":[{"value":"0.0446","scoring_system":"epss","scoring_elements":"0.89125","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9061","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9056","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90633","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90635","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9063","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90605","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174","reference_id":"686174","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=842428","reference_id":"842428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=842428"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1141","reference_id":"RHSA-2012:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1141"},{"reference_url":"https://usn.ubuntu.com/1519-1/","reference_id":"USN-1519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}],"aliases":["CVE-2012-3954"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2gd-p3qx-37eh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35816?format=json","vulnerability_id":"VCID-g3ma-agz7-eka4","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3571.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3571.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3571","reference_id":"","reference_type":"","scores":[{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95537","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95545","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95551","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95562","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95565","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95569","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.9557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.9558","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20553","scoring_system":"epss","scoring_elements":"0.95604","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174","reference_id":"686174","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=842420","reference_id":"842420","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=842420"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37538.py","reference_id":"CVE-2012-3571;OSVDB-84255","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37538.py"},{"reference_url":"https://www.securityfocus.com/bid/54665/info","reference_id":"CVE-2012-3571;OSVDB-84255","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/54665/info"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1140","reference_id":"RHSA-2012:1140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1141","reference_id":"RHSA-2012:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1141"},{"reference_url":"https://usn.ubuntu.com/1519-1/","reference_id":"USN-1519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}],"aliases":["CVE-2012-3571"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g3ma-agz7-eka4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35811?format=json","vulnerability_id":"VCID-hjry-zy32-vfcp","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2749.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2749","reference_id":"","reference_type":"","scores":[{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98884","published_at":"2026-04-08T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98883","published_at":"2026-04-09T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98885","published_at":"2026-04-12T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98886","published_at":"2026-04-13T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98887","published_at":"2026-04-16T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98893","published_at":"2026-04-21T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98897","published_at":"2026-04-26T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98899","published_at":"2026-04-29T12:55:00Z"},{"value":"0.7534","scoring_system":"epss","scoring_elements":"0.98902","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638404","reference_id":"638404","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638404"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=729382","reference_id":"729382","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=729382"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1160","reference_id":"RHSA-2011:1160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1160"},{"reference_url":"https://usn.ubuntu.com/1190-1/","reference_id":"USN-1190-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1190-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}],"aliases":["CVE-2011-2749"],"risk_score":0.3,"exploitability":"0.5","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hjry-zy32-vfcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35810?format=json","vulnerability_id":"VCID-m3fx-k6et-ykg3","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2748.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2748.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2748","reference_id":"","reference_type":"","scores":[{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99466","published_at":"2026-04-01T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99465","published_at":"2026-04-02T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99467","published_at":"2026-04-04T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99469","published_at":"2026-04-07T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99471","published_at":"2026-04-09T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99475","published_at":"2026-04-21T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.87787","scoring_system":"epss","scoring_elements":"0.99479","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638404","reference_id":"638404","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638404"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=729382","reference_id":"729382","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=729382"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1160","reference_id":"RHSA-2011:1160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1160"},{"reference_url":"https://usn.ubuntu.com/1190-1/","reference_id":"USN-1190-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1190-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}],"aliases":["CVE-2011-2748"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m3fx-k6et-ykg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35809?format=json","vulnerability_id":"VCID-qg1j-mnkq-s3b1","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=133226187115472&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=133226187115472&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0997.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0997.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0997","reference_id":"","reference_type":"","scores":[{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.9882","published_at":"2026-05-05T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98793","published_at":"2026-04-01T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98802","published_at":"2026-04-11T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98808","published_at":"2026-04-16T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98809","published_at":"2026-04-18T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98812","published_at":"2026-04-21T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98815","published_at":"2026-04-26T12:55:00Z"},{"value":"0.73501","scoring_system":"epss","scoring_elements":"0.98816","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997"},{"reference_url":"http://secunia.com/advisories/44037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44037"},{"reference_url":"http://secunia.com/advisories/44048","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44048"},{"reference_url":"http://secunia.com/advisories/44089","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44089"},{"reference_url":"http://secunia.com/advisories/44090","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44090"},{"reference_url":"http://secunia.com/advisories/44103","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44103"},{"reference_url":"http://secunia.com/advisories/44127","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44127"},{"reference_url":"http://secunia.com/advisories/44180","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44180"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201301-06.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201301-06.xml"},{"reference_url":"http://securitytracker.com/id?1025300","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025300"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66580","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593345","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593345"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"},{"reference_url":"https://www.exploit-db.com/exploits/37623/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/37623/"},{"reference_url":"https://www.isc.org/software/dhcp/advisories/cve-2011-0997","reference_id":"","reference_type":"","scores":[],"url":"https://www.isc.org/software/dhcp/advisories/cve-2011-0997"},{"reference_url":"http://www.debian.org/security/2011/dsa-2216","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2216"},{"reference_url":"http://www.debian.org/security/2011/dsa-2217","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2217"},{"reference_url":"http://www.kb.cert.org/vuls/id/107886","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/107886"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:073","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"},{"reference_url":"http://www.osvdb.org/71493","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/71493"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0428.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0428.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0840.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0840.html"},{"reference_url":"http://www.securityfocus.com/bid/47176","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47176"},{"reference_url":"http://www.ubuntu.com/usn/USN-1108-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1108-1"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0879","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0879"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0886","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0886"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0909","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0909"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0915","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0915"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0926","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0926"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0965","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0965"},{"reference_url":"http://www.vupen.com/english/advisories/2011/1000","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/1000"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621099","reference_id":"621099","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621099"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=689832","reference_id":"689832","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=689832"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0997","reference_id":"CVE-2011-0997","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0997"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0428","reference_id":"RHSA-2011:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0840","reference_id":"RHSA-2011:0840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0840"},{"reference_url":"https://usn.ubuntu.com/1108-1/","reference_id":"USN-1108-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1108-1/"},{"reference_url":"https://usn.ubuntu.com/1108-2/","reference_id":"USN-1108-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1108-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}],"aliases":["CVE-2011-0997"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qg1j-mnkq-s3b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35814?format=json","vulnerability_id":"VCID-rm9p-arpx-6qdu","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3570.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3570.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3570","reference_id":"","reference_type":"","scores":[{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87863","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87873","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87887","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.8789","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87911","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87917","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87952","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87958","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0368","scoring_system":"epss","scoring_elements":"0.87969","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174","reference_id":"686174","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=842424","reference_id":"842424","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=842424"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}],"aliases":["CVE-2012-3570"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rm9p-arpx-6qdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35822?format=json","vulnerability_id":"VCID-wc57-hq32-vfgn","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088882.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088882.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086992.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086992.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088220.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088220.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00088.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00088.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00103.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00103.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00105.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-09/msg00105.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0504.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3955.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3955.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3955","reference_id":"","reference_type":"","scores":[{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93756","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93825","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93765","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.9379","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93817","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93824","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12095","scoring_system":"epss","scoring_elements":"0.93828","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16816","scoring_system":"epss","scoring_elements":"0.94978","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3955"},{"reference_url":"https://blogs.oracle.com/sunsecurity/entry/cve_2012_3955_denial_of","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.oracle.com/sunsecurity/entry/cve_2012_3955_denial_of"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955"},{"reference_url":"http://secunia.com/advisories/51318","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51318"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201301-06.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201301-06.xml"},{"reference_url":"https://kb.isc.org/article/AA-00779","reference_id":"","reference_type":"","scores":[],"url":"https://kb.isc.org/article/AA-00779"},{"reference_url":"http://www.debian.org/security/2012/dsa-2551","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2012/dsa-2551"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:153"},{"reference_url":"http://www.securityfocus.com/bid/55530","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55530"},{"reference_url":"http://www.securitytracker.com/id?1027528","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027528"},{"reference_url":"http://www.ubuntu.com/usn/USN-1571-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1571-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=856766","reference_id":"856766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=856766"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:a1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:a2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:a2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.0:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.0:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3955","reference_id":"CVE-2012-3955","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3955"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0504","reference_id":"RHSA-2013:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0504"},{"reference_url":"https://usn.ubuntu.com/1571-1/","reference_id":"USN-1571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}],"aliases":["CVE-2012-3955"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wc57-hq32-vfgn"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}