{"url":"http://public2.vulnerablecode.io/api/packages/1052909?format=json","purl":"pkg:deb/debian/libnet-dns-perl@0.19-0.1","type":"deb","namespace":"debian","name":"libnet-dns-perl","version":"0.19-0.1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"0.63-2","latest_non_vulnerable_version":"0.63-2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31420?format=json","vulnerability_id":"VCID-8fbf-8fea-27d9","summary":"Two vulnerabilities in dnsmasq might allow for a Denial of Service or\n    spoofing of DNS replies.","references":[{"reference_url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"},{"reference_url":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html","reference_id":"","reference_type":"","scores":[],"url":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=121866517322103&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=121866517322103&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0533.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0533.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1447","reference_id":"","reference_type":"","scores":[{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99423","published_at":"2026-04-13T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99417","published_at":"2026-04-01T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99416","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99418","published_at":"2026-04-07T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.9942","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447"},{"reference_url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037","reference_id":"","reference_type":"","scores":[],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"},{"reference_url":"http://secunia.com/advisories/30925","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30925"},{"reference_url":"http://secunia.com/advisories/30973","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30973"},{"reference_url":"http://secunia.com/advisories/30977","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30977"},{"reference_url":"http://secunia.com/advisories/30979","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30979"},{"reference_url":"http://secunia.com/advisories/30980","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30980"},{"reference_url":"http://secunia.com/advisories/30988","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30988"},{"reference_url":"http://secunia.com/advisories/30989","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30989"},{"reference_url":"http://secunia.com/advisories/30998","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30998"},{"reference_url":"http://secunia.com/advisories/31011","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31011"},{"reference_url":"http://secunia.com/advisories/31012","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31012"},{"reference_url":"http://secunia.com/advisories/31014","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31014"},{"reference_url":"http://secunia.com/advisories/31019","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31019"},{"reference_url":"http://secunia.com/advisories/31022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31022"},{"reference_url":"http://secunia.com/advisories/31030","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31030"},{"reference_url":"http://secunia.com/advisories/31031","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31031"},{"reference_url":"http://secunia.com/advisories/31033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31033"},{"reference_url":"http://secunia.com/advisories/31052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31052"},{"reference_url":"http://secunia.com/advisories/31065","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31065"},{"reference_url":"http://secunia.com/advisories/31072","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31072"},{"reference_url":"http://secunia.com/advisories/31093","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31093"},{"reference_url":"http://secunia.com/advisories/31094","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31094"},{"reference_url":"http://secunia.com/advisories/31137","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31137"},{"reference_url":"http://secunia.com/advisories/31143","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31143"},{"reference_url":"http://secunia.com/advisories/31151","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31151"},{"reference_url":"http://secunia.com/advisories/31152","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31152"},{"reference_url":"http://secunia.com/advisories/31153","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31153"},{"reference_url":"http://secunia.com/advisories/31169","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31169"},{"reference_url":"http://secunia.com/advisories/31197","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31197"},{"reference_url":"http://secunia.com/advisories/31199","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31199"},{"reference_url":"http://secunia.com/advisories/31204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31204"},{"reference_url":"http://secunia.com/advisories/31207","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31207"},{"reference_url":"http://secunia.com/advisories/31209","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31209"},{"reference_url":"http://secunia.com/advisories/31212","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31212"},{"reference_url":"http://secunia.com/advisories/31213","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31213"},{"reference_url":"http://secunia.com/advisories/31221","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31221"},{"reference_url":"http://secunia.com/advisories/31236","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31236"},{"reference_url":"http://secunia.com/advisories/31237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31237"},{"reference_url":"http://secunia.com/advisories/31254","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31254"},{"reference_url":"http://secunia.com/advisories/31326","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31326"},{"reference_url":"http://secunia.com/advisories/31354","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31354"},{"reference_url":"http://secunia.com/advisories/31422","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31422"},{"reference_url":"http://secunia.com/advisories/31430","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31430"},{"reference_url":"http://secunia.com/advisories/31451","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31451"},{"reference_url":"http://secunia.com/advisories/31482","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31482"},{"reference_url":"http://secunia.com/advisories/31495","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31495"},{"reference_url":"http://secunia.com/advisories/31588","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31588"},{"reference_url":"http://secunia.com/advisories/31687","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31687"},{"reference_url":"http://secunia.com/advisories/31823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31823"},{"reference_url":"http://secunia.com/advisories/31882","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31882"},{"reference_url":"http://secunia.com/advisories/31900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31900"},{"reference_url":"http://secunia.com/advisories/33178","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33178"},{"reference_url":"http://secunia.com/advisories/33714","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33714"},{"reference_url":"http://secunia.com/advisories/33786","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33786"},{"reference_url":"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc","reference_id":"","reference_type":"","scores":[],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200807-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200807-08.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200812-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200812-17.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"},{"reference_url":"http://support.apple.com/kb/HT3026","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3026"},{"reference_url":"http://support.apple.com/kb/HT3129","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3129"},{"reference_url":"http://support.citrix.com/article/CTX117991","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX117991"},{"reference_url":"http://support.citrix.com/article/CTX118183","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX118183"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152"},{"reference_url":"https://www.exploit-db.com/exploits/6122","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/6122"},{"reference_url":"https://www.exploit-db.com/exploits/6123","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/6123"},{"reference_url":"https://www.exploit-db.com/exploits/6130","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/6130"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"},{"reference_url":"https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"},{"reference_url":"http://up2date.astaro.com/2008/08/up2date_7202_released.html","reference_id":"","reference_type":"","scores":[],"url":"http://up2date.astaro.com/2008/08/up2date_7202_released.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"},{"reference_url":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning","reference_id":"","reference_type":"","scores":[],"url":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"},{"reference_url":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"},{"reference_url":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"},{"reference_url":"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"},{"reference_url":"http://www.debian.org/security/2008/dsa-1603","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1603"},{"reference_url":"http://www.debian.org/security/2008/dsa-1604","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1604"},{"reference_url":"http://www.debian.org/security/2008/dsa-1605","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1605"},{"reference_url":"http://www.debian.org/security/2008/dsa-1619","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1619"},{"reference_url":"http://www.debian.org/security/2008/dsa-1623","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1623"},{"reference_url":"http://www.doxpara.com/DMK_BO2K8.ppt","reference_id":"","reference_type":"","scores":[],"url":"http://www.doxpara.com/DMK_BO2K8.ppt"},{"reference_url":"http://www.doxpara.com/?p=1176","reference_id":"","reference_type":"","scores":[],"url":"http://www.doxpara.com/?p=1176"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"},{"reference_url":"http://www.ipcop.org/index.php?name=News&file=article&sid=40","reference_id":"","reference_type":"","scores":[],"url":"http://www.ipcop.org/index.php?name=News&file=article&sid=40"},{"reference_url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php"},{"reference_url":"http://www.kb.cert.org/vuls/id/800113","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/800113"},{"reference_url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"},{"reference_url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"},{"reference_url":"http://www.nominum.com/asset_upload_file741_2661.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.nominum.com/asset_upload_file741_2661.pdf"},{"reference_url":"http://www.novell.com/support/viewContent.do?externalId=7000912","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/support/viewContent.do?externalId=7000912"},{"reference_url":"http://www.openbsd.org/errata42.html#013_bind","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata42.html#013_bind"},{"reference_url":"http://www.openbsd.org/errata43.html#004_bind","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata43.html#004_bind"},{"reference_url":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog","reference_id":"","reference_type":"","scores":[],"url":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"},{"reference_url":"http://www.phys.uu.nl/~rombouts/pdnsd.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.phys.uu.nl/~rombouts/pdnsd.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0789.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0789.html"},{"reference_url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"},{"reference_url":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/","reference_id":"","reference_type":"","scores":[],"url":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"},{"reference_url":"http://www.securityfocus.com/archive/1/495289/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495289/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/30131","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30131"},{"reference_url":"http://www.securitytracker.com/id?1020437","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020437"},{"reference_url":"http://www.securitytracker.com/id?1020438","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020438"},{"reference_url":"http://www.securitytracker.com/id?1020440","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020440"},{"reference_url":"http://www.securitytracker.com/id?1020448","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020448"},{"reference_url":"http://www.securitytracker.com/id?1020449","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020449"},{"reference_url":"http://www.securitytracker.com/id?1020548","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020548"},{"reference_url":"http://www.securitytracker.com/id?1020558","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020558"},{"reference_url":"http://www.securitytracker.com/id?1020560","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020560"},{"reference_url":"http://www.securitytracker.com/id?1020561","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020561"},{"reference_url":"http://www.securitytracker.com/id?1020575","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020575"},{"reference_url":"http://www.securitytracker.com/id?1020576","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020576"},{"reference_url":"http://www.securitytracker.com/id?1020577","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020577"},{"reference_url":"http://www.securitytracker.com/id?1020578","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020578"},{"reference_url":"http://www.securitytracker.com/id?1020579","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020579"},{"reference_url":"http://www.securitytracker.com/id?1020651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020651"},{"reference_url":"http://www.securitytracker.com/id?1020653","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020653"},{"reference_url":"http://www.securitytracker.com/id?1020702","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020702"},{"reference_url":"http://www.securitytracker.com/id?1020802","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020802"},{"reference_url":"http://www.securitytracker.com/id?1020804","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020804"},{"reference_url":"http://www.ubuntu.com/usn/usn-622-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-622-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-627-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-627-1"},{"reference_url":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2019/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2019/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2023/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2023/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2025/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2025/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2029/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2029/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2030/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2030/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2050/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2050/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2051/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2051/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2052/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2052/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2055/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2055/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2092/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2092/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2113/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2113/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2114/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2114/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2123/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2123/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2139/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2139/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2166/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2166/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2195/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2195/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2196/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2196/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2197/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2197/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2268","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2268"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2291","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2291"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2334","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2334"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2342","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2342"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2377","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2377"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2383","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2383"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2384","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2384"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2466","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2467","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2467"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2482","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2482"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2525","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2549","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2549"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2558","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2582","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2582"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2584","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2584"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0297","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0297"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0311","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0311"},{"reference_url":"http://www.vupen.com/english/advisories/2010/0622","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/0622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=449345","reference_id":"449345","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=449345"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123","reference_id":"490123","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465","reference_id":"492465","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698","reference_id":"492698","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700","reference_id":"492700","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599","reference_id":"493599","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1447","reference_id":"CVE-2008-1447","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1447"},{"reference_url":"https://security.gentoo.org/glsa/200807-08","reference_id":"GLSA-200807-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200807-08"},{"reference_url":"https://security.gentoo.org/glsa/200809-02","reference_id":"GLSA-200809-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200809-02"},{"reference_url":"https://security.gentoo.org/glsa/200812-17","reference_id":"GLSA-200812-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200812-17"},{"reference_url":"https://security.gentoo.org/glsa/200901-03","reference_id":"GLSA-200901-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200901-03"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb","reference_id":"OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py","reference_id":"OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c","reference_id":"OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232;OSVDB-46776","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0533","reference_id":"RHSA-2008:0533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0789","reference_id":"RHSA-2008:0789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0789"},{"reference_url":"https://usn.ubuntu.com/622-1/","reference_id":"USN-622-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/622-1/"},{"reference_url":"https://usn.ubuntu.com/627-1/","reference_id":"USN-627-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/627-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052913?format=json","purl":"pkg:deb/debian/libnet-dns-perl@0.63-2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libnet-dns-perl@0.63-2"}],"aliases":["CVE-2008-1447"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fbf-8fea-27d9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62547?format=json","vulnerability_id":"VCID-hcj2-j77c-yfbu","summary":"Multiple vulnerabilities have been discovered in the Net::DNS Perl module,\n    allowing for a Denial of Service and a cache poisoning attack.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc"},{"reference_url":"http://osvdb.org/37053","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37053"},{"reference_url":"http://rt.cpan.org/Public/Bug/Display.html?id=23961","reference_id":"","reference_type":"","scores":[],"url":"http://rt.cpan.org/Public/Bug/Display.html?id=23961"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3377.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3377.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3377","reference_id":"","reference_type":"","scores":[{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87721","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87667","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87677","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.8769","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87691","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87712","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.8773","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87723","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3377"},{"reference_url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245458","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377"},{"reference_url":"http://secunia.com/advisories/25829","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25829"},{"reference_url":"http://secunia.com/advisories/26012","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26012"},{"reference_url":"http://secunia.com/advisories/26014","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26014"},{"reference_url":"http://secunia.com/advisories/26055","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26055"},{"reference_url":"http://secunia.com/advisories/26075","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26075"},{"reference_url":"http://secunia.com/advisories/26211","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26211"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/26417","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26417"},{"reference_url":"http://secunia.com/advisories/26508","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26508"},{"reference_url":"http://secunia.com/advisories/26543","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26543"},{"reference_url":"http://secunia.com/advisories/29354","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29354"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35112","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35112"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9904","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9904"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-351.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-351.htm"},{"reference_url":"http://www.debian.org/security/2008/dsa-1515","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1515"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:146","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:146"},{"reference_url":"http://www.net-dns.org/docs/Changes.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.net-dns.org/docs/Changes.html"},{"reference_url":"http://www.nntp.perl.org/group/perl.qpsmtpd/2006/03/msg4810.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.nntp.perl.org/group/perl.qpsmtpd/2006/03/msg4810.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_17_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_17_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0674.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0674.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0675.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0675.html"},{"reference_url":"http://www.securityfocus.com/archive/1/473871/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/473871/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24669","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24669"},{"reference_url":"http://www.securitytracker.com/id?1018377","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018377"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"http://www.ubuntu.com/usn/usn-483-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-483-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=245466","reference_id":"245466","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=245466"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.34_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.34_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.34_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.34_03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.34_03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.34_03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.37:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.37:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.37:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.38_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.38_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.38_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.38_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.38_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.38_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.39_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.39_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.39_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.39_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.39_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.39_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.40:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.40:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.40:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.40_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.40_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.40_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.41:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.41:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.41:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.42:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.42:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.42:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.42_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.42_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.42_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.42_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.42_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.42_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.43:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.43:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.43:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.44:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.44:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.44:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.44_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.44_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.44_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.44_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.44_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.44_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.45:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.45:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.45:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.45_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.45_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.45_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.46:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.46:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.46:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.47:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.47:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.47:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.47_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.47_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.47_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.48:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.48:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.48:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.48_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.48_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.48_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.48_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.48_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.48_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.48_03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.48_03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.48_03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.49:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.49:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.49:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.49_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.49_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.49_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.49_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.49_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.49_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.49_03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.49_03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.49_03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.51_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.51_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.51_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.51_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.51_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.51_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.53_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.53_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.53_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.53_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.53_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.53_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.55:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.55:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.55:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.58:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.58:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.58:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.59:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:nlnet_labs:net_dns:0.59:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nlnet_labs:net_dns:0.59:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3377","reference_id":"CVE-2007-3377","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3377"},{"reference_url":"https://security.gentoo.org/glsa/200708-06","reference_id":"GLSA-200708-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0674","reference_id":"RHSA-2007:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0674"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0675","reference_id":"RHSA-2007:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0675"},{"reference_url":"https://usn.ubuntu.com/483-1/","reference_id":"USN-483-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/483-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052913?format=json","purl":"pkg:deb/debian/libnet-dns-perl@0.63-2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libnet-dns-perl@0.63-2"}],"aliases":["CVE-2007-3377"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hcj2-j77c-yfbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62548?format=json","vulnerability_id":"VCID-qwfd-dxtw-23c2","summary":"Multiple vulnerabilities have been discovered in the Net::DNS Perl module,\n    allowing for a Denial of Service and a cache poisoning attack.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc"},{"reference_url":"http://osvdb.org/37054","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://osvdb.org/37054"},{"reference_url":"http://rt.cpan.org/Public/Bug/Display.html?id=27285","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://rt.cpan.org/Public/Bug/Display.html?id=27285"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3409.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3409","reference_id":"","reference_type":"","scores":[{"value":"0.1524","scoring_system":"epss","scoring_elements":"0.94582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1524","scoring_system":"epss","scoring_elements":"0.94589","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1524","scoring_system":"epss","scoring_elements":"0.94575","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18031","scoring_system":"epss","scoring_elements":"0.95167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18031","scoring_system":"epss","scoring_elements":"0.95146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18031","scoring_system":"epss","scoring_elements":"0.95153","published_at":"2026-04-08T12:55:00Z"},{"value":"0.18031","scoring_system":"epss","scoring_elements":"0.95157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18031","scoring_system":"epss","scoring_elements":"0.95163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.18031","scoring_system":"epss","scoring_elements":"0.95164","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3409"},{"reference_url":"http://secunia.com/advisories/25829","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://secunia.com/advisories/25829"},{"reference_url":"http://secunia.com/advisories/26012","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://secunia.com/advisories/26012"},{"reference_url":"http://secunia.com/advisories/26014","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://secunia.com/advisories/26014"},{"reference_url":"http://secunia.com/advisories/26055","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://secunia.com/advisories/26055"},{"reference_url":"http://secunia.com/advisories/26075","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://secunia.com/advisories/26075"},{"reference_url":"http://secunia.com/advisories/26211","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://secunia.com/advisories/26211"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/26417","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://secunia.com/advisories/26417"},{"reference_url":"http://secunia.com/advisories/26543","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://secunia.com/advisories/26543"},{"reference_url":"http://secunia.com/advisories/29354","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://secunia.com/advisories/29354"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595"},{"reference_url":"http://www.debian.org/security/2008/dsa-1515","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.debian.org/security/2008/dsa-1515"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:146","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:146"},{"reference_url":"http://www.net-dns.org/docs/Changes.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.net-dns.org/docs/Changes.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_17_sr.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.novell.com/linux/security/advisories/2007_17_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0674.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2007-0674.html"},{"reference_url":"http://www.securityfocus.com/archive/1/473871/100/0/threaded","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.securityfocus.com/archive/1/473871/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24669","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.securityfocus.com/bid/24669"},{"reference_url":"http://www.securitytracker.com/id?1018376","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.securitytracker.com/id?1018376"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"http://www.ubuntu.com/usn/usn-483-1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-07T15:28:48Z/"}],"url":"http://www.ubuntu.com/usn/usn-483-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=245804","reference_id":"245804","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=245804"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:net-dns:net\\:\\:dns:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:net-dns:net\\:\\:dns:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:net-dns:net\\:\\:dns:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3409","reference_id":"CVE-2007-3409","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3409"},{"reference_url":"https://security.gentoo.org/glsa/200708-06","reference_id":"GLSA-200708-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0674","reference_id":"RHSA-2007:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0674"},{"reference_url":"https://usn.ubuntu.com/483-1/","reference_id":"USN-483-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/483-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052913?format=json","purl":"pkg:deb/debian/libnet-dns-perl@0.63-2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libnet-dns-perl@0.63-2"}],"aliases":["CVE-2007-3409"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qwfd-dxtw-23c2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88615?format=json","vulnerability_id":"VCID-sv81-6uf1-fff7","summary":"Net:: DNS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6341.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6341","reference_id":"","reference_type":"","scores":[{"value":"0.18959","scoring_system":"epss","scoring_elements":"0.95277","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18959","scoring_system":"epss","scoring_elements":"0.95289","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18959","scoring_system":"epss","scoring_elements":"0.95294","published_at":"2026-04-04T12:55:00Z"},{"value":"0.18959","scoring_system":"epss","scoring_elements":"0.95299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18959","scoring_system":"epss","scoring_elements":"0.95307","published_at":"2026-04-08T12:55:00Z"},{"value":"0.18959","scoring_system":"epss","scoring_elements":"0.9531","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18959","scoring_system":"epss","scoring_elements":"0.95315","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18959","scoring_system":"epss","scoring_elements":"0.95317","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6341"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=426437","reference_id":"426437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=426437"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457445","reference_id":"457445","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457445"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30895.pl","reference_id":"CVE-2007-6341;OSVDB-43106","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30895.pl"},{"reference_url":"https://www.securityfocus.com/bid/26902/info","reference_id":"CVE-2007-6341;OSVDB-43106","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/26902/info"},{"reference_url":"https://usn.ubuntu.com/594-1/","reference_id":"USN-594-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/594-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052913?format=json","purl":"pkg:deb/debian/libnet-dns-perl@0.63-2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libnet-dns-perl@0.63-2"}],"aliases":["CVE-2007-6341"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sv81-6uf1-fff7"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libnet-dns-perl@0.19-0.1"}