{"url":"http://public2.vulnerablecode.io/api/packages/75819?format=json","purl":"pkg:ebuild/net-dns/bind@9.4.3_p5","type":"ebuild","namespace":"net-dns","name":"bind","version":"9.4.3_p5","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"9.7.4_p1","latest_non_vulnerable_version":"9.16.33","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41861?format=json","vulnerability_id":"VCID-1xb4-ff1w-zydd","summary":"Several cache poisoning vulnerabilities have been found in BIND.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0290.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0290.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0290","reference_id":"","reference_type":"","scores":[{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89528","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89545","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89568","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89574","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89582","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89583","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89593","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89598","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89606","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89624","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89637","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89633","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89643","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04877","scoring_system":"epss","scoring_elements":"0.89663","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0290"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=557121","reference_id":"557121","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=557121"},{"reference_url":"https://security.gentoo.org/glsa/201006-11","reference_id":"GLSA-201006-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0062","reference_id":"RHSA-2010:0062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0062"},{"reference_url":"https://usn.ubuntu.com/888-1/","reference_id":"USN-888-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/888-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75819?format=json","purl":"pkg:ebuild/net-dns/bind@9.4.3_p5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.4.3_p5"}],"aliases":["CVE-2010-0290"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xb4-ff1w-zydd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41860?format=json","vulnerability_id":"VCID-6awz-zv8n-mbbr","summary":"Several cache poisoning vulnerabilities have been found in BIND.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0097.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0097.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0097","reference_id":"","reference_type":"","scores":[{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86085","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86111","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86141","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86155","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86154","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.8615","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86167","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86172","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86164","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86194","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86214","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86235","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86254","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.8625","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02817","scoring_system":"epss","scoring_elements":"0.86301","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=554851","reference_id":"554851","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=554851"},{"reference_url":"https://security.gentoo.org/glsa/201006-11","reference_id":"GLSA-201006-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0062","reference_id":"RHSA-2010:0062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0062"},{"reference_url":"https://usn.ubuntu.com/888-1/","reference_id":"USN-888-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/888-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75819?format=json","purl":"pkg:ebuild/net-dns/bind@9.4.3_p5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.4.3_p5"}],"aliases":["CVE-2010-0097"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6awz-zv8n-mbbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41862?format=json","vulnerability_id":"VCID-at9s-723u-cfac","summary":"Several cache poisoning vulnerabilities have been found in BIND.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0382.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0382","reference_id":"","reference_type":"","scores":[{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96487","published_at":"2026-04-01T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96495","published_at":"2026-04-02T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96499","published_at":"2026-04-04T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96503","published_at":"2026-04-07T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96512","published_at":"2026-04-08T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96518","published_at":"2026-04-12T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.9652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96527","published_at":"2026-04-16T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96532","published_at":"2026-04-26T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96533","published_at":"2026-04-29T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96541","published_at":"2026-05-05T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96542","published_at":"2026-05-07T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96548","published_at":"2026-05-09T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.9655","published_at":"2026-05-11T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96555","published_at":"2026-05-12T12:55:00Z"},{"value":"0.28405","scoring_system":"epss","scoring_elements":"0.96564","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0382"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=557983","reference_id":"557983","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=557983"},{"reference_url":"https://security.gentoo.org/glsa/201006-11","reference_id":"GLSA-201006-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0062","reference_id":"RHSA-2010:0062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0062"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75819?format=json","purl":"pkg:ebuild/net-dns/bind@9.4.3_p5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.4.3_p5"}],"aliases":["CVE-2010-0382"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-at9s-723u-cfac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41859?format=json","vulnerability_id":"VCID-h3bf-tgtb-77ex","summary":"Several cache poisoning vulnerabilities have been found in BIND.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4022.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4022.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4022","reference_id":"","reference_type":"","scores":[{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95451","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.9546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95467","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.9547","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95474","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95485","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.9549","published_at":"2026-04-18T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95493","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95494","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95495","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95505","published_at":"2026-05-05T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.9551","published_at":"2026-05-07T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95516","published_at":"2026-05-09T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95522","published_at":"2026-05-11T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.95527","published_at":"2026-05-12T12:55:00Z"},{"value":"0.20044","scoring_system":"epss","scoring_elements":"0.9554","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=538744","reference_id":"538744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=538744"},{"reference_url":"https://security.gentoo.org/glsa/201006-11","reference_id":"GLSA-201006-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1620","reference_id":"RHSA-2009:1620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1620"},{"reference_url":"https://usn.ubuntu.com/865-1/","reference_id":"USN-865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/865-1/"},{"reference_url":"https://usn.ubuntu.com/888-1/","reference_id":"USN-888-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/888-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75819?format=json","purl":"pkg:ebuild/net-dns/bind@9.4.3_p5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.4.3_p5"}],"aliases":["CVE-2009-4022"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h3bf-tgtb-77ex"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.4.3_p5"}