Lookup for vulnerable packages by Package URL.

GET /api/packages/1051243?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1051243?format=api",
    "purl": "pkg:deb/debian/adns@1.4-2",
    "type": "deb",
    "namespace": "debian",
    "name": "adns",
    "version": "1.4-2",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "1.6.0-2",
    "latest_non_vulnerable_version": "1.6.0-2",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93357?format=api",
            "vulnerability_id": "VCID-4b8y-aqh2-9fe8",
            "summary": "An issue was discovered in adns before 1.5.2. It overruns reading a buffer if a domain ends with backslash. If the query domain ended with \\, and adns_qf_quoteok_query was specified, qdparselabel would read additional bytes from the buffer and try to treat them as the escape sequence. It would depart the input buffer and start processing many bytes of arbitrary heap data as if it were the query domain. Eventually it would run out of input or find some other kind of error, and declare the query domain invalid. But before then it might outrun available memory and crash. In principle this could be a denial of service attack.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67126",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67054",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67091",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6709",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67139",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67152",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67171",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67157",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9107"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051246?format=api",
                    "purl": "pkg:deb/debian/adns@1.6.0-2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2"
                }
            ],
            "aliases": [
                "CVE-2017-9107"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4b8y-aqh2-9fe8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93353?format=api",
            "vulnerability_id": "VCID-5zre-ud6f-ckfe",
            "summary": "An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71399",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71355",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71363",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71381",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71356",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71397",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71409",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71432",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71417",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9103"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9103"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051246?format=api",
                    "purl": "pkg:deb/debian/adns@1.6.0-2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2"
                }
            ],
            "aliases": [
                "CVE-2017-9103"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5zre-ud6f-ckfe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93356?format=api",
            "vulnerability_id": "VCID-6yhs-39tq-e3hc",
            "summary": "An issue was discovered in adns before 1.5.2. adns_rr_info mishandles a bogus *datap. The general pattern for formatting integers is to sprintf into a fixed-size buffer. This is correct if the input is in the right range; if it isn't, the buffer may be overrun (depending on the sizes of the types on the current platform). Of course the inputs ought to be right. And there are pointers in there too, so perhaps one could say that the caller ought to check these things. It may be better to require the caller to make the pointer structure right, but to have the code here be defensive about (and tolerate with an error but without crashing) out-of-range integer values. So: it should defend each of these integer conversion sites with a check for the actual permitted range, and return adns_s_invaliddata if not. The lack of this check causes the SOA sign extension bug to be a serious security problem: the sign extended SOA value is out of range, and overruns the buffer when reconverted. This is related to sign extending SOA 32-bit integer fields, and use of a signed data type.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67126",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67054",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67091",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6709",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67139",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67152",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67171",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67157",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9106"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9106"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051246?format=api",
                    "purl": "pkg:deb/debian/adns@1.6.0-2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2"
                }
            ],
            "aliases": [
                "CVE-2017-9106"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6yhs-39tq-e3hc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93355?format=api",
            "vulnerability_id": "VCID-j4d3-qrnw-gbd2",
            "summary": "An issue was discovered in adns before 1.5.2. It corrupts a pointer when a nameserver speaks first because of a wrong number of pointer dereferences. This bug may well be exploitable as a remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87016",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86965",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86975",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86994",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86987",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87007",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87014",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87028",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87022",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9105"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9105"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051246?format=api",
                    "purl": "pkg:deb/debian/adns@1.6.0-2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2"
                }
            ],
            "aliases": [
                "CVE-2017-9105"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j4d3-qrnw-gbd2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93359?format=api",
            "vulnerability_id": "VCID-j7dr-cbuk-tkgp",
            "summary": "An issue was discovered in adns before 1.5.2. It fails to ignore apparent answers before the first RR that was found the first time. when this is fixed, the second answer scan finds the same RRs at the first. Otherwise, adns can be confused by interleaving answers for the CNAME target, with the CNAME itself. In that case the answer data structure (on the heap) can be overrun. With this fixed, it prefers to look only at the answer RRs which come after the CNAME, which is at least arguably correct.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71319",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71274",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71282",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71299",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71315",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71329",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71351",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71336",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9109"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051246?format=api",
                    "purl": "pkg:deb/debian/adns@1.6.0-2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2"
                }
            ],
            "aliases": [
                "CVE-2017-9109"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7dr-cbuk-tkgp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93354?format=api",
            "vulnerability_id": "VCID-j7qp-xbgk-h7c6",
            "summary": "An issue was discovered in adns before 1.5.2. It hangs, eating CPU, if a compression pointer loop is encountered.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71319",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71274",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71282",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71299",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71315",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71329",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71351",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71336",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9104"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9104"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051246?format=api",
                    "purl": "pkg:deb/debian/adns@1.6.0-2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2"
                }
            ],
            "aliases": [
                "CVE-2017-9104"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7qp-xbgk-h7c6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93358?format=api",
            "vulnerability_id": "VCID-q5km-d9qe-pfbu",
            "summary": "An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() would have done. Without this fix, adnshost may read and process one byte beyond the buffer, perhaps crashing or perhaps somehow leaking the value of that byte.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67126",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67054",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67091",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6709",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67139",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67152",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67171",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67157",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9108"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051246?format=api",
                    "purl": "pkg:deb/debian/adns@1.6.0-2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2"
                }
            ],
            "aliases": [
                "CVE-2017-9108"
            ],
            "risk_score": 1.0,
            "exploitability": "0.5",
            "weighted_severity": "2.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5km-d9qe-pfbu"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31420?format=api",
            "vulnerability_id": "VCID-8fbf-8fea-27d9",
            "summary": "Two vulnerabilities in dnsmasq might allow for a Denial of Service or\n    spoofing of DNS replies.",
            "references": [
                {
                    "reference_url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"
                },
                {
                    "reference_url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
                },
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
                },
                {
                    "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"
                },
                {
                    "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
                },
                {
                    "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=121630706004256&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=121630706004256&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=121866517322103&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=121866517322103&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=123324863916385&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=123324863916385&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141879471518471&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141879471518471&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99423",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99422",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99417",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99416",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99418",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99419",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9942",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1447"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447"
                },
                {
                    "reference_url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30925"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30973",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30973"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30977"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30979",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30979"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30980",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30980"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30988"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30989"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30998"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31011"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31012",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31012"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31014",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31014"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31019"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31022"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31030"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31031"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31033"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31052"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31065"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31072"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31093"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31094"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31137"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31143"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31151",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31151"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31152"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31153",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31153"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31169"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31197"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31199"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31204",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31204"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31207"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31209"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31212"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31213"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31221"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31236"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31237"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31254"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31326"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31354",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31354"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31422",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31422"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31430"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31451"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31482"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31495",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31495"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31588"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31687"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31823"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31882"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31900"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33178"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33714"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33786"
                },
                {
                    "reference_url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200807-08.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200812-17.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3026"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3129"
                },
                {
                    "reference_url": "http://support.citrix.com/article/CTX117991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.citrix.com/article/CTX117991"
                },
                {
                    "reference_url": "http://support.citrix.com/article/CTX118183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.citrix.com/article/CTX118183"
                },
                {
                    "reference_url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/6122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/6122"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/6123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/6123"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/6130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/6130"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"
                },
                {
                    "reference_url": "https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
                },
                {
                    "reference_url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
                },
                {
                    "reference_url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
                },
                {
                    "reference_url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"
                },
                {
                    "reference_url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"
                },
                {
                    "reference_url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1603"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1604"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1605"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1619"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1623"
                },
                {
                    "reference_url": "http://www.doxpara.com/DMK_BO2K8.ppt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.doxpara.com/DMK_BO2K8.ppt"
                },
                {
                    "reference_url": "http://www.doxpara.com/?p=1176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.doxpara.com/?p=1176"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"
                },
                {
                    "reference_url": "http://www.ipcop.org/index.php?name=News&file=article&sid=40",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ipcop.org/index.php?name=News&file=article&sid=40"
                },
                {
                    "reference_url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/800113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kb.cert.org/vuls/id/800113"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"
                },
                {
                    "reference_url": "http://www.nominum.com/asset_upload_file741_2661.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
                },
                {
                    "reference_url": "http://www.novell.com/support/viewContent.do?externalId=7000912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/support/viewContent.do?externalId=7000912"
                },
                {
                    "reference_url": "http://www.openbsd.org/errata42.html#013_bind",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openbsd.org/errata42.html#013_bind"
                },
                {
                    "reference_url": "http://www.openbsd.org/errata43.html#004_bind",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openbsd.org/errata43.html#004_bind"
                },
                {
                    "reference_url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"
                },
                {
                    "reference_url": "http://www.phys.uu.nl/~rombouts/pdnsd.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html"
                },
                {
                    "reference_url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
                },
                {
                    "reference_url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/30131",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/30131"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020437"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020438"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020440"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020448"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020449"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020548"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020558"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020560",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020560"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020561",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020561"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020575"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020576"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020577"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020578"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020579"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020651"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020653"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020702"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020802"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020804"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-622-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-622-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-627-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-627-1"
                },
                {
                    "reference_url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2019/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2019/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2023/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2023/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2025/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2025/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2029/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2029/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2030/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2030/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2050/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2050/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2051/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2051/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2052/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2052/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2055/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2055/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2092/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2092/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2113/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2113/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2114/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2114/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2123/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2123/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2139/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2139/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2166/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2166/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2195/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2195/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2196/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2196/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2197/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2197/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2268"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2291"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2334"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2342",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2342"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2377"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2383"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2384",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2384"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2466"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2467"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2482"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2525"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2549"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2558"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2582"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2584"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0297"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0311"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/0622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/0622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345",
                    "reference_id": "449345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123",
                    "reference_id": "490123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465",
                    "reference_id": "492465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698",
                    "reference_id": "492698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700",
                    "reference_id": "492700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599",
                    "reference_id": "493599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447",
                    "reference_id": "CVE-2008-1447",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200807-08",
                    "reference_id": "GLSA-200807-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200807-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200809-02",
                    "reference_id": "GLSA-200809-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200809-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200812-17",
                    "reference_id": "GLSA-200812-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200812-17"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200901-03",
                    "reference_id": "GLSA-200901-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200901-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb",
                    "reference_id": "OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py",
                    "reference_id": "OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c",
                    "reference_id": "OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232;OSVDB-46776",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0533",
                    "reference_id": "RHSA-2008:0533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0533"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0789",
                    "reference_id": "RHSA-2008:0789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0789"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/622-1/",
                    "reference_id": "USN-622-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/622-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/627-1/",
                    "reference_id": "USN-627-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/627-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051243?format=api",
                    "purl": "pkg:deb/debian/adns@1.4-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4b8y-aqh2-9fe8"
                        },
                        {
                            "vulnerability": "VCID-5zre-ud6f-ckfe"
                        },
                        {
                            "vulnerability": "VCID-6yhs-39tq-e3hc"
                        },
                        {
                            "vulnerability": "VCID-j4d3-qrnw-gbd2"
                        },
                        {
                            "vulnerability": "VCID-j7dr-cbuk-tkgp"
                        },
                        {
                            "vulnerability": "VCID-j7qp-xbgk-h7c6"
                        },
                        {
                            "vulnerability": "VCID-q5km-d9qe-pfbu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.4-2"
                }
            ],
            "aliases": [
                "CVE-2008-1447"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8fbf-8fea-27d9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88344?format=api",
            "vulnerability_id": "VCID-c3zv-cg7f-hfe3",
            "summary": "adns: DNS spoofing flaw",
            "references": [
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4100.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4100.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69736",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69671",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69683",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69699",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69676",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69726",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69743",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69764",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69749",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4100"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4100"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/6197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/6197"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2008/09/11/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2008/09/11/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2008/09/16/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2008/09/16/4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=462751",
                    "reference_id": "462751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=462751"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698",
                    "reference_id": "492698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:adns:1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4100",
                    "reference_id": "CVE-2008-4100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4100"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051243?format=api",
                    "purl": "pkg:deb/debian/adns@1.4-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4b8y-aqh2-9fe8"
                        },
                        {
                            "vulnerability": "VCID-5zre-ud6f-ckfe"
                        },
                        {
                            "vulnerability": "VCID-6yhs-39tq-e3hc"
                        },
                        {
                            "vulnerability": "VCID-j4d3-qrnw-gbd2"
                        },
                        {
                            "vulnerability": "VCID-j7dr-cbuk-tkgp"
                        },
                        {
                            "vulnerability": "VCID-j7qp-xbgk-h7c6"
                        },
                        {
                            "vulnerability": "VCID-q5km-d9qe-pfbu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.4-2"
                }
            ],
            "aliases": [
                "CVE-2008-4100"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c3zv-cg7f-hfe3"
        }
    ],
    "risk_score": "1.9",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.4-2"
}