Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/adns@1.0-6
Typedeb
Namespacedebian
Nameadns
Version1.0-6
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.6.0-2
Latest_non_vulnerable_version1.6.0-2
Affected_by_vulnerabilities
0
url VCID-4b8y-aqh2-9fe8
vulnerability_id VCID-4b8y-aqh2-9fe8
summary An issue was discovered in adns before 1.5.2. It overruns reading a buffer if a domain ends with backslash. If the query domain ended with \, and adns_qf_quoteok_query was specified, qdparselabel would read additional bytes from the buffer and try to treat them as the escape sequence. It would depart the input buffer and start processing many bytes of arbitrary heap data as if it were the query domain. Eventually it would run out of input or find some other kind of error, and declare the query domain invalid. But before then it might outrun available memory and crash. In principle this could be a denial of service attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9107
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67126
published_at 2026-04-13T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67054
published_at 2026-04-01T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67091
published_at 2026-04-02T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67115
published_at 2026-04-04T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.6709
published_at 2026-04-07T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67139
published_at 2026-04-08T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67152
published_at 2026-04-09T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67171
published_at 2026-04-11T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67157
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9107
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9107
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9107
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4b8y-aqh2-9fe8
1
url VCID-5zre-ud6f-ckfe
vulnerability_id VCID-5zre-ud6f-ckfe
summary An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9103
reference_id
reference_type
scores
0
value 0.00674
scoring_system epss
scoring_elements 0.71399
published_at 2026-04-13T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71355
published_at 2026-04-01T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71363
published_at 2026-04-02T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71381
published_at 2026-04-04T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71356
published_at 2026-04-07T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.71397
published_at 2026-04-08T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71409
published_at 2026-04-09T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.71432
published_at 2026-04-11T12:55:00Z
8
value 0.00674
scoring_system epss
scoring_elements 0.71417
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9103
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9103
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9103
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zre-ud6f-ckfe
2
url VCID-6yhs-39tq-e3hc
vulnerability_id VCID-6yhs-39tq-e3hc
summary An issue was discovered in adns before 1.5.2. adns_rr_info mishandles a bogus *datap. The general pattern for formatting integers is to sprintf into a fixed-size buffer. This is correct if the input is in the right range; if it isn't, the buffer may be overrun (depending on the sizes of the types on the current platform). Of course the inputs ought to be right. And there are pointers in there too, so perhaps one could say that the caller ought to check these things. It may be better to require the caller to make the pointer structure right, but to have the code here be defensive about (and tolerate with an error but without crashing) out-of-range integer values. So: it should defend each of these integer conversion sites with a check for the actual permitted range, and return adns_s_invaliddata if not. The lack of this check causes the SOA sign extension bug to be a serious security problem: the sign extended SOA value is out of range, and overruns the buffer when reconverted. This is related to sign extending SOA 32-bit integer fields, and use of a signed data type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9106
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67126
published_at 2026-04-13T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67054
published_at 2026-04-01T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67091
published_at 2026-04-02T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67115
published_at 2026-04-04T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.6709
published_at 2026-04-07T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67139
published_at 2026-04-08T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67152
published_at 2026-04-09T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67171
published_at 2026-04-11T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67157
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9106
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9106
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9106
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yhs-39tq-e3hc
3
url VCID-8fbf-8fea-27d9
vulnerability_id VCID-8fbf-8fea-27d9
summary
Two vulnerabilities in dnsmasq might allow for a Denial of Service or
    spoofing of DNS replies.
references
0
reference_url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
reference_id
reference_type
scores
url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
1
reference_url http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
reference_id
reference_type
scores
url http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
2
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
3
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
4
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
5
reference_url http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
6
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
7
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
8
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
9
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
12
reference_url http://marc.info/?l=bugtraq&m=121630706004256&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=121630706004256&w=2
13
reference_url http://marc.info/?l=bugtraq&m=121866517322103&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=121866517322103&w=2
14
reference_url http://marc.info/?l=bugtraq&m=123324863916385&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=123324863916385&w=2
15
reference_url http://marc.info/?l=bugtraq&m=141879471518471&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141879471518471&w=2
16
reference_url http://rhn.redhat.com/errata/RHSA-2008-0533.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0533.html
17
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json
18
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1447
reference_id
reference_type
scores
0
value 0.86697
scoring_system epss
scoring_elements 0.99423
published_at 2026-04-13T12:55:00Z
1
value 0.86697
scoring_system epss
scoring_elements 0.99422
published_at 2026-04-11T12:55:00Z
2
value 0.86697
scoring_system epss
scoring_elements 0.99417
published_at 2026-04-01T12:55:00Z
3
value 0.86697
scoring_system epss
scoring_elements 0.99416
published_at 2026-04-02T12:55:00Z
4
value 0.86697
scoring_system epss
scoring_elements 0.99418
published_at 2026-04-07T12:55:00Z
5
value 0.86697
scoring_system epss
scoring_elements 0.99419
published_at 2026-04-08T12:55:00Z
6
value 0.86697
scoring_system epss
scoring_elements 0.9942
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1447
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
20
reference_url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
reference_id
reference_type
scores
url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
21
reference_url http://secunia.com/advisories/30925
reference_id
reference_type
scores
url http://secunia.com/advisories/30925
22
reference_url http://secunia.com/advisories/30973
reference_id
reference_type
scores
url http://secunia.com/advisories/30973
23
reference_url http://secunia.com/advisories/30977
reference_id
reference_type
scores
url http://secunia.com/advisories/30977
24
reference_url http://secunia.com/advisories/30979
reference_id
reference_type
scores
url http://secunia.com/advisories/30979
25
reference_url http://secunia.com/advisories/30980
reference_id
reference_type
scores
url http://secunia.com/advisories/30980
26
reference_url http://secunia.com/advisories/30988
reference_id
reference_type
scores
url http://secunia.com/advisories/30988
27
reference_url http://secunia.com/advisories/30989
reference_id
reference_type
scores
url http://secunia.com/advisories/30989
28
reference_url http://secunia.com/advisories/30998
reference_id
reference_type
scores
url http://secunia.com/advisories/30998
29
reference_url http://secunia.com/advisories/31011
reference_id
reference_type
scores
url http://secunia.com/advisories/31011
30
reference_url http://secunia.com/advisories/31012
reference_id
reference_type
scores
url http://secunia.com/advisories/31012
31
reference_url http://secunia.com/advisories/31014
reference_id
reference_type
scores
url http://secunia.com/advisories/31014
32
reference_url http://secunia.com/advisories/31019
reference_id
reference_type
scores
url http://secunia.com/advisories/31019
33
reference_url http://secunia.com/advisories/31022
reference_id
reference_type
scores
url http://secunia.com/advisories/31022
34
reference_url http://secunia.com/advisories/31030
reference_id
reference_type
scores
url http://secunia.com/advisories/31030
35
reference_url http://secunia.com/advisories/31031
reference_id
reference_type
scores
url http://secunia.com/advisories/31031
36
reference_url http://secunia.com/advisories/31033
reference_id
reference_type
scores
url http://secunia.com/advisories/31033
37
reference_url http://secunia.com/advisories/31052
reference_id
reference_type
scores
url http://secunia.com/advisories/31052
38
reference_url http://secunia.com/advisories/31065
reference_id
reference_type
scores
url http://secunia.com/advisories/31065
39
reference_url http://secunia.com/advisories/31072
reference_id
reference_type
scores
url http://secunia.com/advisories/31072
40
reference_url http://secunia.com/advisories/31093
reference_id
reference_type
scores
url http://secunia.com/advisories/31093
41
reference_url http://secunia.com/advisories/31094
reference_id
reference_type
scores
url http://secunia.com/advisories/31094
42
reference_url http://secunia.com/advisories/31137
reference_id
reference_type
scores
url http://secunia.com/advisories/31137
43
reference_url http://secunia.com/advisories/31143
reference_id
reference_type
scores
url http://secunia.com/advisories/31143
44
reference_url http://secunia.com/advisories/31151
reference_id
reference_type
scores
url http://secunia.com/advisories/31151
45
reference_url http://secunia.com/advisories/31152
reference_id
reference_type
scores
url http://secunia.com/advisories/31152
46
reference_url http://secunia.com/advisories/31153
reference_id
reference_type
scores
url http://secunia.com/advisories/31153
47
reference_url http://secunia.com/advisories/31169
reference_id
reference_type
scores
url http://secunia.com/advisories/31169
48
reference_url http://secunia.com/advisories/31197
reference_id
reference_type
scores
url http://secunia.com/advisories/31197
49
reference_url http://secunia.com/advisories/31199
reference_id
reference_type
scores
url http://secunia.com/advisories/31199
50
reference_url http://secunia.com/advisories/31204
reference_id
reference_type
scores
url http://secunia.com/advisories/31204
51
reference_url http://secunia.com/advisories/31207
reference_id
reference_type
scores
url http://secunia.com/advisories/31207
52
reference_url http://secunia.com/advisories/31209
reference_id
reference_type
scores
url http://secunia.com/advisories/31209
53
reference_url http://secunia.com/advisories/31212
reference_id
reference_type
scores
url http://secunia.com/advisories/31212
54
reference_url http://secunia.com/advisories/31213
reference_id
reference_type
scores
url http://secunia.com/advisories/31213
55
reference_url http://secunia.com/advisories/31221
reference_id
reference_type
scores
url http://secunia.com/advisories/31221
56
reference_url http://secunia.com/advisories/31236
reference_id
reference_type
scores
url http://secunia.com/advisories/31236
57
reference_url http://secunia.com/advisories/31237
reference_id
reference_type
scores
url http://secunia.com/advisories/31237
58
reference_url http://secunia.com/advisories/31254
reference_id
reference_type
scores
url http://secunia.com/advisories/31254
59
reference_url http://secunia.com/advisories/31326
reference_id
reference_type
scores
url http://secunia.com/advisories/31326
60
reference_url http://secunia.com/advisories/31354
reference_id
reference_type
scores
url http://secunia.com/advisories/31354
61
reference_url http://secunia.com/advisories/31422
reference_id
reference_type
scores
url http://secunia.com/advisories/31422
62
reference_url http://secunia.com/advisories/31430
reference_id
reference_type
scores
url http://secunia.com/advisories/31430
63
reference_url http://secunia.com/advisories/31451
reference_id
reference_type
scores
url http://secunia.com/advisories/31451
64
reference_url http://secunia.com/advisories/31482
reference_id
reference_type
scores
url http://secunia.com/advisories/31482
65
reference_url http://secunia.com/advisories/31495
reference_id
reference_type
scores
url http://secunia.com/advisories/31495
66
reference_url http://secunia.com/advisories/31588
reference_id
reference_type
scores
url http://secunia.com/advisories/31588
67
reference_url http://secunia.com/advisories/31687
reference_id
reference_type
scores
url http://secunia.com/advisories/31687
68
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
69
reference_url http://secunia.com/advisories/31882
reference_id
reference_type
scores
url http://secunia.com/advisories/31882
70
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
71
reference_url http://secunia.com/advisories/33178
reference_id
reference_type
scores
url http://secunia.com/advisories/33178
72
reference_url http://secunia.com/advisories/33714
reference_id
reference_type
scores
url http://secunia.com/advisories/33714
73
reference_url http://secunia.com/advisories/33786
reference_id
reference_type
scores
url http://secunia.com/advisories/33786
74
reference_url http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
reference_id
reference_type
scores
url http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
75
reference_url http://security.gentoo.org/glsa/glsa-200807-08.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200807-08.xml
76
reference_url http://security.gentoo.org/glsa/glsa-200812-17.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-17.xml
77
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
78
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
79
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
80
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
81
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
82
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
83
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
84
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
85
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
86
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
87
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
88
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
89
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
90
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
91
reference_url http://support.citrix.com/article/CTX117991
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX117991
92
reference_url http://support.citrix.com/article/CTX118183
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX118183
93
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
94
reference_url https://www.exploit-db.com/exploits/6122
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6122
95
reference_url https://www.exploit-db.com/exploits/6123
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6123
96
reference_url https://www.exploit-db.com/exploits/6130
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6130
97
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
98
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
99
reference_url https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
100
reference_url http://up2date.astaro.com/2008/08/up2date_7202_released.html
reference_id
reference_type
scores
url http://up2date.astaro.com/2008/08/up2date_7202_released.html
101
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
102
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
103
reference_url http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
reference_id
reference_type
scores
url http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
104
reference_url http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
reference_id
reference_type
scores
url http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
105
reference_url http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
reference_id
reference_type
scores
url http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
106
reference_url http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
reference_id
reference_type
scores
url http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
107
reference_url http://www.debian.org/security/2008/dsa-1603
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1603
108
reference_url http://www.debian.org/security/2008/dsa-1604
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1604
109
reference_url http://www.debian.org/security/2008/dsa-1605
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1605
110
reference_url http://www.debian.org/security/2008/dsa-1619
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1619
111
reference_url http://www.debian.org/security/2008/dsa-1623
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1623
112
reference_url http://www.doxpara.com/DMK_BO2K8.ppt
reference_id
reference_type
scores
url http://www.doxpara.com/DMK_BO2K8.ppt
113
reference_url http://www.doxpara.com/?p=1176
reference_id
reference_type
scores
url http://www.doxpara.com/?p=1176
114
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
115
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
116
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
117
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
118
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
119
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
120
reference_url http://www.ipcop.org/index.php?name=News&file=article&sid=40
reference_id
reference_type
scores
url http://www.ipcop.org/index.php?name=News&file=article&sid=40
121
reference_url http://www.isc.org/index.pl?/sw/bind/bind-security.php
reference_id
reference_type
scores
url http://www.isc.org/index.pl?/sw/bind/bind-security.php
122
reference_url http://www.kb.cert.org/vuls/id/800113
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/800113
123
reference_url http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
124
reference_url http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
125
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
126
reference_url http://www.nominum.com/asset_upload_file741_2661.pdf
reference_id
reference_type
scores
url http://www.nominum.com/asset_upload_file741_2661.pdf
127
reference_url http://www.novell.com/support/viewContent.do?externalId=7000912
reference_id
reference_type
scores
url http://www.novell.com/support/viewContent.do?externalId=7000912
128
reference_url http://www.openbsd.org/errata42.html#013_bind
reference_id
reference_type
scores
url http://www.openbsd.org/errata42.html#013_bind
129
reference_url http://www.openbsd.org/errata43.html#004_bind
reference_id
reference_type
scores
url http://www.openbsd.org/errata43.html#004_bind
130
reference_url http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
reference_id
reference_type
scores
url http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
131
reference_url http://www.phys.uu.nl/~rombouts/pdnsd.html
reference_id
reference_type
scores
url http://www.phys.uu.nl/~rombouts/pdnsd.html
132
reference_url http://www.redhat.com/support/errata/RHSA-2008-0789.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0789.html
133
reference_url http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
reference_id
reference_type
scores
url http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
134
reference_url http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
reference_id
reference_type
scores
url http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
135
reference_url http://www.securityfocus.com/archive/1/495289/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495289/100/0/threaded
136
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
137
reference_url http://www.securityfocus.com/bid/30131
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30131
138
reference_url http://www.securitytracker.com/id?1020437
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020437
139
reference_url http://www.securitytracker.com/id?1020438
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020438
140
reference_url http://www.securitytracker.com/id?1020440
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020440
141
reference_url http://www.securitytracker.com/id?1020448
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020448
142
reference_url http://www.securitytracker.com/id?1020449
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020449
143
reference_url http://www.securitytracker.com/id?1020548
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020548
144
reference_url http://www.securitytracker.com/id?1020558
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020558
145
reference_url http://www.securitytracker.com/id?1020560
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020560
146
reference_url http://www.securitytracker.com/id?1020561
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020561
147
reference_url http://www.securitytracker.com/id?1020575
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020575
148
reference_url http://www.securitytracker.com/id?1020576
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020576
149
reference_url http://www.securitytracker.com/id?1020577
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020577
150
reference_url http://www.securitytracker.com/id?1020578
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020578
151
reference_url http://www.securitytracker.com/id?1020579
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020579
152
reference_url http://www.securitytracker.com/id?1020651
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020651
153
reference_url http://www.securitytracker.com/id?1020653
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020653
154
reference_url http://www.securitytracker.com/id?1020702
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020702
155
reference_url http://www.securitytracker.com/id?1020802
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020802
156
reference_url http://www.securitytracker.com/id?1020804
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020804
157
reference_url http://www.ubuntu.com/usn/usn-622-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-622-1
158
reference_url http://www.ubuntu.com/usn/usn-627-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-627-1
159
reference_url http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
reference_id
reference_type
scores
url http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
160
reference_url http://www.us-cert.gov/cas/techalerts/TA08-190A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-190A.html
161
reference_url http://www.us-cert.gov/cas/techalerts/TA08-190B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-190B.html
162
reference_url http://www.us-cert.gov/cas/techalerts/TA08-260A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-260A.html
163
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
164
reference_url http://www.vupen.com/english/advisories/2008/2019/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2019/references
165
reference_url http://www.vupen.com/english/advisories/2008/2023/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2023/references
166
reference_url http://www.vupen.com/english/advisories/2008/2025/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2025/references
167
reference_url http://www.vupen.com/english/advisories/2008/2029/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2029/references
168
reference_url http://www.vupen.com/english/advisories/2008/2030/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2030/references
169
reference_url http://www.vupen.com/english/advisories/2008/2050/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2050/references
170
reference_url http://www.vupen.com/english/advisories/2008/2051/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2051/references
171
reference_url http://www.vupen.com/english/advisories/2008/2052/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2052/references
172
reference_url http://www.vupen.com/english/advisories/2008/2055/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2055/references
173
reference_url http://www.vupen.com/english/advisories/2008/2092/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2092/references
174
reference_url http://www.vupen.com/english/advisories/2008/2113/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2113/references
175
reference_url http://www.vupen.com/english/advisories/2008/2114/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2114/references
176
reference_url http://www.vupen.com/english/advisories/2008/2123/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2123/references
177
reference_url http://www.vupen.com/english/advisories/2008/2139/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2139/references
178
reference_url http://www.vupen.com/english/advisories/2008/2166/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2166/references
179
reference_url http://www.vupen.com/english/advisories/2008/2195/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2195/references
180
reference_url http://www.vupen.com/english/advisories/2008/2196/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2196/references
181
reference_url http://www.vupen.com/english/advisories/2008/2197/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2197/references
182
reference_url http://www.vupen.com/english/advisories/2008/2268
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2268
183
reference_url http://www.vupen.com/english/advisories/2008/2291
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2291
184
reference_url http://www.vupen.com/english/advisories/2008/2334
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2334
185
reference_url http://www.vupen.com/english/advisories/2008/2342
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2342
186
reference_url http://www.vupen.com/english/advisories/2008/2377
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2377
187
reference_url http://www.vupen.com/english/advisories/2008/2383
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2383
188
reference_url http://www.vupen.com/english/advisories/2008/2384
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2384
189
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
190
reference_url http://www.vupen.com/english/advisories/2008/2467
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2467
191
reference_url http://www.vupen.com/english/advisories/2008/2482
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2482
192
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
193
reference_url http://www.vupen.com/english/advisories/2008/2549
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2549
194
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
195
reference_url http://www.vupen.com/english/advisories/2008/2582
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2582
196
reference_url http://www.vupen.com/english/advisories/2008/2584
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2584
197
reference_url http://www.vupen.com/english/advisories/2009/0297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0297
198
reference_url http://www.vupen.com/english/advisories/2009/0311
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0311
199
reference_url http://www.vupen.com/english/advisories/2010/0622
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0622
200
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=449345
reference_id 449345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=449345
201
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123
reference_id 490123
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123
202
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465
reference_id 492465
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465
203
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
reference_id 492698
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
204
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700
reference_id 492700
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700
205
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599
reference_id 493599
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1447
reference_id CVE-2008-1447
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-1447
242
reference_url https://security.gentoo.org/glsa/200807-08
reference_id GLSA-200807-08
reference_type
scores
url https://security.gentoo.org/glsa/200807-08
243
reference_url https://security.gentoo.org/glsa/200809-02
reference_id GLSA-200809-02
reference_type
scores
url https://security.gentoo.org/glsa/200809-02
244
reference_url https://security.gentoo.org/glsa/200812-17
reference_id GLSA-200812-17
reference_type
scores
url https://security.gentoo.org/glsa/200812-17
245
reference_url https://security.gentoo.org/glsa/200901-03
reference_id GLSA-200901-03
reference_type
scores
url https://security.gentoo.org/glsa/200901-03
246
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
247
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb
248
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py
249
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232;OSVDB-46776
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c
250
reference_url https://access.redhat.com/errata/RHSA-2008:0533
reference_id RHSA-2008:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0533
251
reference_url https://access.redhat.com/errata/RHSA-2008:0789
reference_id RHSA-2008:0789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0789
252
reference_url https://usn.ubuntu.com/622-1/
reference_id USN-622-1
reference_type
scores
url https://usn.ubuntu.com/622-1/
253
reference_url https://usn.ubuntu.com/627-1/
reference_id USN-627-1
reference_type
scores
url https://usn.ubuntu.com/627-1/
fixed_packages
0
url pkg:deb/debian/adns@1.4-2
purl pkg:deb/debian/adns@1.4-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4b8y-aqh2-9fe8
1
vulnerability VCID-5zre-ud6f-ckfe
2
vulnerability VCID-6yhs-39tq-e3hc
3
vulnerability VCID-j4d3-qrnw-gbd2
4
vulnerability VCID-j7dr-cbuk-tkgp
5
vulnerability VCID-j7qp-xbgk-h7c6
6
vulnerability VCID-q5km-d9qe-pfbu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.4-2
aliases CVE-2008-1447
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fbf-8fea-27d9
4
url VCID-c3zv-cg7f-hfe3
vulnerability_id VCID-c3zv-cg7f-hfe3
summary adns: DNS spoofing flaw
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4100.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4100.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4100
reference_id
reference_type
scores
0
value 0.0061
scoring_system epss
scoring_elements 0.69736
published_at 2026-04-13T12:55:00Z
1
value 0.0061
scoring_system epss
scoring_elements 0.69671
published_at 2026-04-01T12:55:00Z
2
value 0.0061
scoring_system epss
scoring_elements 0.69683
published_at 2026-04-02T12:55:00Z
3
value 0.0061
scoring_system epss
scoring_elements 0.69699
published_at 2026-04-04T12:55:00Z
4
value 0.0061
scoring_system epss
scoring_elements 0.69676
published_at 2026-04-07T12:55:00Z
5
value 0.0061
scoring_system epss
scoring_elements 0.69726
published_at 2026-04-08T12:55:00Z
6
value 0.0061
scoring_system epss
scoring_elements 0.69743
published_at 2026-04-09T12:55:00Z
7
value 0.0061
scoring_system epss
scoring_elements 0.69764
published_at 2026-04-11T12:55:00Z
8
value 0.0061
scoring_system epss
scoring_elements 0.69749
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4100
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4100
4
reference_url https://www.exploit-db.com/exploits/6197
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6197
5
reference_url http://www.openwall.com/lists/oss-security/2008/09/11/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/11/1
6
reference_url http://www.openwall.com/lists/oss-security/2008/09/16/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/16/4
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=462751
reference_id 462751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=462751
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
reference_id 492698
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.7:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.8:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:0.9:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:adns:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:adns:1.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4100
reference_id CVE-2008-4100
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4100
fixed_packages
0
url pkg:deb/debian/adns@1.4-2
purl pkg:deb/debian/adns@1.4-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4b8y-aqh2-9fe8
1
vulnerability VCID-5zre-ud6f-ckfe
2
vulnerability VCID-6yhs-39tq-e3hc
3
vulnerability VCID-j4d3-qrnw-gbd2
4
vulnerability VCID-j7dr-cbuk-tkgp
5
vulnerability VCID-j7qp-xbgk-h7c6
6
vulnerability VCID-q5km-d9qe-pfbu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.4-2
aliases CVE-2008-4100
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c3zv-cg7f-hfe3
5
url VCID-j4d3-qrnw-gbd2
vulnerability_id VCID-j4d3-qrnw-gbd2
summary An issue was discovered in adns before 1.5.2. It corrupts a pointer when a nameserver speaks first because of a wrong number of pointer dereferences. This bug may well be exploitable as a remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9105
reference_id
reference_type
scores
0
value 0.03207
scoring_system epss
scoring_elements 0.87016
published_at 2026-04-13T12:55:00Z
1
value 0.03207
scoring_system epss
scoring_elements 0.86965
published_at 2026-04-01T12:55:00Z
2
value 0.03207
scoring_system epss
scoring_elements 0.86975
published_at 2026-04-02T12:55:00Z
3
value 0.03207
scoring_system epss
scoring_elements 0.86994
published_at 2026-04-04T12:55:00Z
4
value 0.03207
scoring_system epss
scoring_elements 0.86987
published_at 2026-04-07T12:55:00Z
5
value 0.03207
scoring_system epss
scoring_elements 0.87007
published_at 2026-04-08T12:55:00Z
6
value 0.03207
scoring_system epss
scoring_elements 0.87014
published_at 2026-04-09T12:55:00Z
7
value 0.03207
scoring_system epss
scoring_elements 0.87028
published_at 2026-04-11T12:55:00Z
8
value 0.03207
scoring_system epss
scoring_elements 0.87022
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9105
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9105
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9105
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4d3-qrnw-gbd2
6
url VCID-j7dr-cbuk-tkgp
vulnerability_id VCID-j7dr-cbuk-tkgp
summary An issue was discovered in adns before 1.5.2. It fails to ignore apparent answers before the first RR that was found the first time. when this is fixed, the second answer scan finds the same RRs at the first. Otherwise, adns can be confused by interleaving answers for the CNAME target, with the CNAME itself. In that case the answer data structure (on the heap) can be overrun. With this fixed, it prefers to look only at the answer RRs which come after the CNAME, which is at least arguably correct.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9109
reference_id
reference_type
scores
0
value 0.0067
scoring_system epss
scoring_elements 0.71319
published_at 2026-04-13T12:55:00Z
1
value 0.0067
scoring_system epss
scoring_elements 0.71274
published_at 2026-04-07T12:55:00Z
2
value 0.0067
scoring_system epss
scoring_elements 0.71282
published_at 2026-04-02T12:55:00Z
3
value 0.0067
scoring_system epss
scoring_elements 0.71299
published_at 2026-04-04T12:55:00Z
4
value 0.0067
scoring_system epss
scoring_elements 0.71315
published_at 2026-04-08T12:55:00Z
5
value 0.0067
scoring_system epss
scoring_elements 0.71329
published_at 2026-04-09T12:55:00Z
6
value 0.0067
scoring_system epss
scoring_elements 0.71351
published_at 2026-04-11T12:55:00Z
7
value 0.0067
scoring_system epss
scoring_elements 0.71336
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9109
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9109
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9109
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7dr-cbuk-tkgp
7
url VCID-j7qp-xbgk-h7c6
vulnerability_id VCID-j7qp-xbgk-h7c6
summary An issue was discovered in adns before 1.5.2. It hangs, eating CPU, if a compression pointer loop is encountered.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9104
reference_id
reference_type
scores
0
value 0.0067
scoring_system epss
scoring_elements 0.71319
published_at 2026-04-13T12:55:00Z
1
value 0.0067
scoring_system epss
scoring_elements 0.71274
published_at 2026-04-07T12:55:00Z
2
value 0.0067
scoring_system epss
scoring_elements 0.71282
published_at 2026-04-02T12:55:00Z
3
value 0.0067
scoring_system epss
scoring_elements 0.71299
published_at 2026-04-04T12:55:00Z
4
value 0.0067
scoring_system epss
scoring_elements 0.71315
published_at 2026-04-08T12:55:00Z
5
value 0.0067
scoring_system epss
scoring_elements 0.71329
published_at 2026-04-09T12:55:00Z
6
value 0.0067
scoring_system epss
scoring_elements 0.71351
published_at 2026-04-11T12:55:00Z
7
value 0.0067
scoring_system epss
scoring_elements 0.71336
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9104
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9104
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9104
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7qp-xbgk-h7c6
8
url VCID-q5km-d9qe-pfbu
vulnerability_id VCID-q5km-d9qe-pfbu
summary An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() would have done. Without this fix, adnshost may read and process one byte beyond the buffer, perhaps crashing or perhaps somehow leaking the value of that byte.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9108
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67126
published_at 2026-04-13T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67054
published_at 2026-04-01T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67091
published_at 2026-04-02T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67115
published_at 2026-04-04T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.6709
published_at 2026-04-07T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67139
published_at 2026-04-08T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67152
published_at 2026-04-09T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67171
published_at 2026-04-11T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67157
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9108
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9108
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/adns@1.6.0-2
purl pkg:deb/debian/adns@1.6.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.6.0-2
aliases CVE-2017-9108
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5km-d9qe-pfbu
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/adns@1.0-6