{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60037?format=json","vulnerability_id":"VCID-t74w-b9nr-kbfv","summary":"dhcpd as included in the ISC DHCP implementation does not properly handle\n    special conditions, leading to a Denial of Service.","aliases":[{"alias":"CVE-2009-1892"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925716?format=json","purl":"pkg:deb/debian/isc-dhcp@3.1.2p1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@3.1.2p1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925717?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.1-2.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925715?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.3-P1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.3-P1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925718?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.3-P1-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.3-P1-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/84754?format=json","purl":"pkg:ebuild/net-misc/dhcp@3.1.2_p1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@3.1.2_p1"}],"affected_packages":[],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1892.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1892.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1892","reference_id":"","reference_type":"","scores":[{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91168","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91181","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91219","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91218","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91243","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91253","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91252","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91267","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91285","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91296","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91294","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06663","scoring_system":"epss","scoring_elements":"0.91303","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1892"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=509845","reference_id":"509845","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=509845"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539492","reference_id":"539492","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539492"},{"reference_url":"https://security.gentoo.org/glsa/200908-08","reference_id":"GLSA-200908-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200908-08"}],"weaknesses":[],"exploits":[],"severity_range_score":null,"exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t74w-b9nr-kbfv"}