Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/dnspython@2.8.0-2?distro=trixie
Typedeb
Namespacedebian
Namednspython
Version2.8.0-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7493-kzzq-27dw
vulnerability_id VCID-7493-kzzq-27dw
summary
Potential DoS via the Tudoor mechanism in eventlet and dnspython
eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29483.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29483.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29483
reference_id
reference_type
scores
0
value 0.04954
scoring_system epss
scoring_elements 0.89655
published_at 2026-04-13T12:55:00Z
1
value 0.04954
scoring_system epss
scoring_elements 0.89656
published_at 2026-04-09T12:55:00Z
2
value 0.04954
scoring_system epss
scoring_elements 0.89663
published_at 2026-04-11T12:55:00Z
3
value 0.04954
scoring_system epss
scoring_elements 0.89619
published_at 2026-04-02T12:55:00Z
4
value 0.04954
scoring_system epss
scoring_elements 0.89661
published_at 2026-04-12T12:55:00Z
5
value 0.04954
scoring_system epss
scoring_elements 0.89633
published_at 2026-04-07T12:55:00Z
6
value 0.04954
scoring_system epss
scoring_elements 0.8965
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29483
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29483
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/eventlet/eventlet
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/eventlet/eventlet
5
reference_url https://github.com/eventlet/eventlet/commit/51e3c4928d4938beb576eff34f3bf97e6e64e6b4
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/eventlet/eventlet/commit/51e3c4928d4938beb576eff34f3bf97e6e64e6b4
6
reference_url https://github.com/eventlet/eventlet/issues/913
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-11T17:34:51Z/
url https://github.com/eventlet/eventlet/issues/913
7
reference_url https://github.com/eventlet/eventlet/releases/tag/v0.35.2
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-11T17:34:51Z/
url https://github.com/eventlet/eventlet/releases/tag/v0.35.2
8
reference_url https://github.com/rthalley/dnspython/commit/0ea5ad0a4583e1f519b9bcc67cfac381230d9cf2
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rthalley/dnspython/commit/0ea5ad0a4583e1f519b9bcc67cfac381230d9cf2
9
reference_url https://github.com/rthalley/dnspython/issues/1045
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-11T17:34:51Z/
url https://github.com/rthalley/dnspython/issues/1045
10
reference_url https://github.com/rthalley/dnspython/releases/tag/v2.6.0
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-11T17:34:51Z/
url https://github.com/rthalley/dnspython/releases/tag/v2.6.0
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29483
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29483
15
reference_url https://security.netapp.com/advisory/ntap-20240510-0001
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240510-0001
16
reference_url https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-11T17:34:51Z/
url https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713
17
reference_url https://www.dnspython.org
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.dnspython.org
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274520
reference_id 2274520
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274520
19
reference_url https://github.com/advisories/GHSA-3rq5-2g8h-59hc
reference_id GHSA-3rq5-2g8h-59hc
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3rq5-2g8h-59hc
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/
reference_id NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-11T17:34:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/
21
reference_url https://security.netapp.com/advisory/ntap-20240510-0001/
reference_id ntap-20240510-0001
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-11T17:34:51Z/
url https://security.netapp.com/advisory/ntap-20240510-0001/
22
reference_url https://access.redhat.com/errata/RHSA-2024:3275
reference_id RHSA-2024:3275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3275
23
reference_url https://access.redhat.com/errata/RHSA-2024:3483
reference_id RHSA-2024:3483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3483
24
reference_url https://access.redhat.com/errata/RHSA-2024:4846
reference_id RHSA-2024:4846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4846
25
reference_url https://access.redhat.com/errata/RHSA-2024:9423
reference_id RHSA-2024:9423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9423
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/
reference_id VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-11T17:34:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/
27
reference_url https://www.dnspython.org/
reference_id www.dnspython.org
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-11T17:34:51Z/
url https://www.dnspython.org/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/
reference_id X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-11T17:34:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/
fixed_packages
0
url pkg:deb/debian/dnspython@2.6.0-1?distro=trixie
purl pkg:deb/debian/dnspython@2.6.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnspython@2.6.0-1%3Fdistro=trixie
1
url pkg:deb/debian/dnspython@2.7.0-1?distro=trixie
purl pkg:deb/debian/dnspython@2.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnspython@2.7.0-1%3Fdistro=trixie
2
url pkg:deb/debian/dnspython@2.8.0-2?distro=trixie
purl pkg:deb/debian/dnspython@2.8.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnspython@2.8.0-2%3Fdistro=trixie
aliases CVE-2023-29483, GHSA-3rq5-2g8h-59hc
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7493-kzzq-27dw
1
url VCID-8fbf-8fea-27d9
vulnerability_id VCID-8fbf-8fea-27d9
summary
Two vulnerabilities in dnsmasq might allow for a Denial of Service or
    spoofing of DNS replies.
references
0
reference_url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
reference_id
reference_type
scores
url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
1
reference_url http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
reference_id
reference_type
scores
url http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
2
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
3
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
4
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
5
reference_url http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
6
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
7
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
8
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
9
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
12
reference_url http://marc.info/?l=bugtraq&m=121630706004256&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=121630706004256&w=2
13
reference_url http://marc.info/?l=bugtraq&m=121866517322103&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=121866517322103&w=2
14
reference_url http://marc.info/?l=bugtraq&m=123324863916385&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=123324863916385&w=2
15
reference_url http://marc.info/?l=bugtraq&m=141879471518471&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141879471518471&w=2
16
reference_url http://rhn.redhat.com/errata/RHSA-2008-0533.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0533.html
17
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json
18
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1447
reference_id
reference_type
scores
0
value 0.86697
scoring_system epss
scoring_elements 0.99423
published_at 2026-04-13T12:55:00Z
1
value 0.86697
scoring_system epss
scoring_elements 0.99422
published_at 2026-04-11T12:55:00Z
2
value 0.86697
scoring_system epss
scoring_elements 0.99417
published_at 2026-04-01T12:55:00Z
3
value 0.86697
scoring_system epss
scoring_elements 0.99416
published_at 2026-04-02T12:55:00Z
4
value 0.86697
scoring_system epss
scoring_elements 0.99418
published_at 2026-04-07T12:55:00Z
5
value 0.86697
scoring_system epss
scoring_elements 0.99419
published_at 2026-04-08T12:55:00Z
6
value 0.86697
scoring_system epss
scoring_elements 0.9942
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1447
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
20
reference_url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
reference_id
reference_type
scores
url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
21
reference_url http://secunia.com/advisories/30925
reference_id
reference_type
scores
url http://secunia.com/advisories/30925
22
reference_url http://secunia.com/advisories/30973
reference_id
reference_type
scores
url http://secunia.com/advisories/30973
23
reference_url http://secunia.com/advisories/30977
reference_id
reference_type
scores
url http://secunia.com/advisories/30977
24
reference_url http://secunia.com/advisories/30979
reference_id
reference_type
scores
url http://secunia.com/advisories/30979
25
reference_url http://secunia.com/advisories/30980
reference_id
reference_type
scores
url http://secunia.com/advisories/30980
26
reference_url http://secunia.com/advisories/30988
reference_id
reference_type
scores
url http://secunia.com/advisories/30988
27
reference_url http://secunia.com/advisories/30989
reference_id
reference_type
scores
url http://secunia.com/advisories/30989
28
reference_url http://secunia.com/advisories/30998
reference_id
reference_type
scores
url http://secunia.com/advisories/30998
29
reference_url http://secunia.com/advisories/31011
reference_id
reference_type
scores
url http://secunia.com/advisories/31011
30
reference_url http://secunia.com/advisories/31012
reference_id
reference_type
scores
url http://secunia.com/advisories/31012
31
reference_url http://secunia.com/advisories/31014
reference_id
reference_type
scores
url http://secunia.com/advisories/31014
32
reference_url http://secunia.com/advisories/31019
reference_id
reference_type
scores
url http://secunia.com/advisories/31019
33
reference_url http://secunia.com/advisories/31022
reference_id
reference_type
scores
url http://secunia.com/advisories/31022
34
reference_url http://secunia.com/advisories/31030
reference_id
reference_type
scores
url http://secunia.com/advisories/31030
35
reference_url http://secunia.com/advisories/31031
reference_id
reference_type
scores
url http://secunia.com/advisories/31031
36
reference_url http://secunia.com/advisories/31033
reference_id
reference_type
scores
url http://secunia.com/advisories/31033
37
reference_url http://secunia.com/advisories/31052
reference_id
reference_type
scores
url http://secunia.com/advisories/31052
38
reference_url http://secunia.com/advisories/31065
reference_id
reference_type
scores
url http://secunia.com/advisories/31065
39
reference_url http://secunia.com/advisories/31072
reference_id
reference_type
scores
url http://secunia.com/advisories/31072
40
reference_url http://secunia.com/advisories/31093
reference_id
reference_type
scores
url http://secunia.com/advisories/31093
41
reference_url http://secunia.com/advisories/31094
reference_id
reference_type
scores
url http://secunia.com/advisories/31094
42
reference_url http://secunia.com/advisories/31137
reference_id
reference_type
scores
url http://secunia.com/advisories/31137
43
reference_url http://secunia.com/advisories/31143
reference_id
reference_type
scores
url http://secunia.com/advisories/31143
44
reference_url http://secunia.com/advisories/31151
reference_id
reference_type
scores
url http://secunia.com/advisories/31151
45
reference_url http://secunia.com/advisories/31152
reference_id
reference_type
scores
url http://secunia.com/advisories/31152
46
reference_url http://secunia.com/advisories/31153
reference_id
reference_type
scores
url http://secunia.com/advisories/31153
47
reference_url http://secunia.com/advisories/31169
reference_id
reference_type
scores
url http://secunia.com/advisories/31169
48
reference_url http://secunia.com/advisories/31197
reference_id
reference_type
scores
url http://secunia.com/advisories/31197
49
reference_url http://secunia.com/advisories/31199
reference_id
reference_type
scores
url http://secunia.com/advisories/31199
50
reference_url http://secunia.com/advisories/31204
reference_id
reference_type
scores
url http://secunia.com/advisories/31204
51
reference_url http://secunia.com/advisories/31207
reference_id
reference_type
scores
url http://secunia.com/advisories/31207
52
reference_url http://secunia.com/advisories/31209
reference_id
reference_type
scores
url http://secunia.com/advisories/31209
53
reference_url http://secunia.com/advisories/31212
reference_id
reference_type
scores
url http://secunia.com/advisories/31212
54
reference_url http://secunia.com/advisories/31213
reference_id
reference_type
scores
url http://secunia.com/advisories/31213
55
reference_url http://secunia.com/advisories/31221
reference_id
reference_type
scores
url http://secunia.com/advisories/31221
56
reference_url http://secunia.com/advisories/31236
reference_id
reference_type
scores
url http://secunia.com/advisories/31236
57
reference_url http://secunia.com/advisories/31237
reference_id
reference_type
scores
url http://secunia.com/advisories/31237
58
reference_url http://secunia.com/advisories/31254
reference_id
reference_type
scores
url http://secunia.com/advisories/31254
59
reference_url http://secunia.com/advisories/31326
reference_id
reference_type
scores
url http://secunia.com/advisories/31326
60
reference_url http://secunia.com/advisories/31354
reference_id
reference_type
scores
url http://secunia.com/advisories/31354
61
reference_url http://secunia.com/advisories/31422
reference_id
reference_type
scores
url http://secunia.com/advisories/31422
62
reference_url http://secunia.com/advisories/31430
reference_id
reference_type
scores
url http://secunia.com/advisories/31430
63
reference_url http://secunia.com/advisories/31451
reference_id
reference_type
scores
url http://secunia.com/advisories/31451
64
reference_url http://secunia.com/advisories/31482
reference_id
reference_type
scores
url http://secunia.com/advisories/31482
65
reference_url http://secunia.com/advisories/31495
reference_id
reference_type
scores
url http://secunia.com/advisories/31495
66
reference_url http://secunia.com/advisories/31588
reference_id
reference_type
scores
url http://secunia.com/advisories/31588
67
reference_url http://secunia.com/advisories/31687
reference_id
reference_type
scores
url http://secunia.com/advisories/31687
68
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
69
reference_url http://secunia.com/advisories/31882
reference_id
reference_type
scores
url http://secunia.com/advisories/31882
70
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
71
reference_url http://secunia.com/advisories/33178
reference_id
reference_type
scores
url http://secunia.com/advisories/33178
72
reference_url http://secunia.com/advisories/33714
reference_id
reference_type
scores
url http://secunia.com/advisories/33714
73
reference_url http://secunia.com/advisories/33786
reference_id
reference_type
scores
url http://secunia.com/advisories/33786
74
reference_url http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
reference_id
reference_type
scores
url http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
75
reference_url http://security.gentoo.org/glsa/glsa-200807-08.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200807-08.xml
76
reference_url http://security.gentoo.org/glsa/glsa-200812-17.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-17.xml
77
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
78
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
79
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
80
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
81
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
82
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
83
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
84
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
85
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
86
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
87
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
88
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
89
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
90
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
91
reference_url http://support.citrix.com/article/CTX117991
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX117991
92
reference_url http://support.citrix.com/article/CTX118183
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX118183
93
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
94
reference_url https://www.exploit-db.com/exploits/6122
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6122
95
reference_url https://www.exploit-db.com/exploits/6123
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6123
96
reference_url https://www.exploit-db.com/exploits/6130
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6130
97
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
98
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
99
reference_url https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
100
reference_url http://up2date.astaro.com/2008/08/up2date_7202_released.html
reference_id
reference_type
scores
url http://up2date.astaro.com/2008/08/up2date_7202_released.html
101
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
102
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
103
reference_url http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
reference_id
reference_type
scores
url http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
104
reference_url http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
reference_id
reference_type
scores
url http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
105
reference_url http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
reference_id
reference_type
scores
url http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
106
reference_url http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
reference_id
reference_type
scores
url http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
107
reference_url http://www.debian.org/security/2008/dsa-1603
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1603
108
reference_url http://www.debian.org/security/2008/dsa-1604
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1604
109
reference_url http://www.debian.org/security/2008/dsa-1605
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1605
110
reference_url http://www.debian.org/security/2008/dsa-1619
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1619
111
reference_url http://www.debian.org/security/2008/dsa-1623
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1623
112
reference_url http://www.doxpara.com/DMK_BO2K8.ppt
reference_id
reference_type
scores
url http://www.doxpara.com/DMK_BO2K8.ppt
113
reference_url http://www.doxpara.com/?p=1176
reference_id
reference_type
scores
url http://www.doxpara.com/?p=1176
114
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
115
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
116
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
117
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
118
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
119
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
120
reference_url http://www.ipcop.org/index.php?name=News&file=article&sid=40
reference_id
reference_type
scores
url http://www.ipcop.org/index.php?name=News&file=article&sid=40
121
reference_url http://www.isc.org/index.pl?/sw/bind/bind-security.php
reference_id
reference_type
scores
url http://www.isc.org/index.pl?/sw/bind/bind-security.php
122
reference_url http://www.kb.cert.org/vuls/id/800113
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/800113
123
reference_url http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
124
reference_url http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
125
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
126
reference_url http://www.nominum.com/asset_upload_file741_2661.pdf
reference_id
reference_type
scores
url http://www.nominum.com/asset_upload_file741_2661.pdf
127
reference_url http://www.novell.com/support/viewContent.do?externalId=7000912
reference_id
reference_type
scores
url http://www.novell.com/support/viewContent.do?externalId=7000912
128
reference_url http://www.openbsd.org/errata42.html#013_bind
reference_id
reference_type
scores
url http://www.openbsd.org/errata42.html#013_bind
129
reference_url http://www.openbsd.org/errata43.html#004_bind
reference_id
reference_type
scores
url http://www.openbsd.org/errata43.html#004_bind
130
reference_url http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
reference_id
reference_type
scores
url http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
131
reference_url http://www.phys.uu.nl/~rombouts/pdnsd.html
reference_id
reference_type
scores
url http://www.phys.uu.nl/~rombouts/pdnsd.html
132
reference_url http://www.redhat.com/support/errata/RHSA-2008-0789.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0789.html
133
reference_url http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
reference_id
reference_type
scores
url http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
134
reference_url http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
reference_id
reference_type
scores
url http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
135
reference_url http://www.securityfocus.com/archive/1/495289/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495289/100/0/threaded
136
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
137
reference_url http://www.securityfocus.com/bid/30131
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30131
138
reference_url http://www.securitytracker.com/id?1020437
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020437
139
reference_url http://www.securitytracker.com/id?1020438
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020438
140
reference_url http://www.securitytracker.com/id?1020440
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020440
141
reference_url http://www.securitytracker.com/id?1020448
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020448
142
reference_url http://www.securitytracker.com/id?1020449
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020449
143
reference_url http://www.securitytracker.com/id?1020548
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020548
144
reference_url http://www.securitytracker.com/id?1020558
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020558
145
reference_url http://www.securitytracker.com/id?1020560
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020560
146
reference_url http://www.securitytracker.com/id?1020561
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020561
147
reference_url http://www.securitytracker.com/id?1020575
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020575
148
reference_url http://www.securitytracker.com/id?1020576
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020576
149
reference_url http://www.securitytracker.com/id?1020577
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020577
150
reference_url http://www.securitytracker.com/id?1020578
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020578
151
reference_url http://www.securitytracker.com/id?1020579
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020579
152
reference_url http://www.securitytracker.com/id?1020651
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020651
153
reference_url http://www.securitytracker.com/id?1020653
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020653
154
reference_url http://www.securitytracker.com/id?1020702
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020702
155
reference_url http://www.securitytracker.com/id?1020802
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020802
156
reference_url http://www.securitytracker.com/id?1020804
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020804
157
reference_url http://www.ubuntu.com/usn/usn-622-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-622-1
158
reference_url http://www.ubuntu.com/usn/usn-627-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-627-1
159
reference_url http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
reference_id
reference_type
scores
url http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
160
reference_url http://www.us-cert.gov/cas/techalerts/TA08-190A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-190A.html
161
reference_url http://www.us-cert.gov/cas/techalerts/TA08-190B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-190B.html
162
reference_url http://www.us-cert.gov/cas/techalerts/TA08-260A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-260A.html
163
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
164
reference_url http://www.vupen.com/english/advisories/2008/2019/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2019/references
165
reference_url http://www.vupen.com/english/advisories/2008/2023/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2023/references
166
reference_url http://www.vupen.com/english/advisories/2008/2025/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2025/references
167
reference_url http://www.vupen.com/english/advisories/2008/2029/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2029/references
168
reference_url http://www.vupen.com/english/advisories/2008/2030/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2030/references
169
reference_url http://www.vupen.com/english/advisories/2008/2050/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2050/references
170
reference_url http://www.vupen.com/english/advisories/2008/2051/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2051/references
171
reference_url http://www.vupen.com/english/advisories/2008/2052/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2052/references
172
reference_url http://www.vupen.com/english/advisories/2008/2055/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2055/references
173
reference_url http://www.vupen.com/english/advisories/2008/2092/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2092/references
174
reference_url http://www.vupen.com/english/advisories/2008/2113/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2113/references
175
reference_url http://www.vupen.com/english/advisories/2008/2114/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2114/references
176
reference_url http://www.vupen.com/english/advisories/2008/2123/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2123/references
177
reference_url http://www.vupen.com/english/advisories/2008/2139/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2139/references
178
reference_url http://www.vupen.com/english/advisories/2008/2166/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2166/references
179
reference_url http://www.vupen.com/english/advisories/2008/2195/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2195/references
180
reference_url http://www.vupen.com/english/advisories/2008/2196/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2196/references
181
reference_url http://www.vupen.com/english/advisories/2008/2197/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2197/references
182
reference_url http://www.vupen.com/english/advisories/2008/2268
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2268
183
reference_url http://www.vupen.com/english/advisories/2008/2291
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2291
184
reference_url http://www.vupen.com/english/advisories/2008/2334
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2334
185
reference_url http://www.vupen.com/english/advisories/2008/2342
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2342
186
reference_url http://www.vupen.com/english/advisories/2008/2377
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2377
187
reference_url http://www.vupen.com/english/advisories/2008/2383
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2383
188
reference_url http://www.vupen.com/english/advisories/2008/2384
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2384
189
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
190
reference_url http://www.vupen.com/english/advisories/2008/2467
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2467
191
reference_url http://www.vupen.com/english/advisories/2008/2482
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2482
192
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
193
reference_url http://www.vupen.com/english/advisories/2008/2549
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2549
194
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
195
reference_url http://www.vupen.com/english/advisories/2008/2582
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2582
196
reference_url http://www.vupen.com/english/advisories/2008/2584
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2584
197
reference_url http://www.vupen.com/english/advisories/2009/0297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0297
198
reference_url http://www.vupen.com/english/advisories/2009/0311
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0311
199
reference_url http://www.vupen.com/english/advisories/2010/0622
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0622
200
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=449345
reference_id 449345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=449345
201
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123
reference_id 490123
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123
202
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465
reference_id 492465
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465
203
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
reference_id 492698
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
204
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700
reference_id 492700
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700
205
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599
reference_id 493599
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1447
reference_id CVE-2008-1447
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-1447
242
reference_url https://security.gentoo.org/glsa/200807-08
reference_id GLSA-200807-08
reference_type
scores
url https://security.gentoo.org/glsa/200807-08
243
reference_url https://security.gentoo.org/glsa/200809-02
reference_id GLSA-200809-02
reference_type
scores
url https://security.gentoo.org/glsa/200809-02
244
reference_url https://security.gentoo.org/glsa/200812-17
reference_id GLSA-200812-17
reference_type
scores
url https://security.gentoo.org/glsa/200812-17
245
reference_url https://security.gentoo.org/glsa/200901-03
reference_id GLSA-200901-03
reference_type
scores
url https://security.gentoo.org/glsa/200901-03
246
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
247
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb
248
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py
249
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232;OSVDB-46776
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c
250
reference_url https://access.redhat.com/errata/RHSA-2008:0533
reference_id RHSA-2008:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0533
251
reference_url https://access.redhat.com/errata/RHSA-2008:0789
reference_id RHSA-2008:0789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0789
252
reference_url https://usn.ubuntu.com/622-1/
reference_id USN-622-1
reference_type
scores
url https://usn.ubuntu.com/622-1/
253
reference_url https://usn.ubuntu.com/627-1/
reference_id USN-627-1
reference_type
scores
url https://usn.ubuntu.com/627-1/
fixed_packages
0
url pkg:deb/debian/dnspython@1.7.1-1?distro=trixie
purl pkg:deb/debian/dnspython@1.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnspython@1.7.1-1%3Fdistro=trixie
1
url pkg:deb/debian/dnspython@2.0.0-1?distro=trixie
purl pkg:deb/debian/dnspython@2.0.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7493-kzzq-27dw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnspython@2.0.0-1%3Fdistro=trixie
2
url pkg:deb/debian/dnspython@2.3.0-1?distro=trixie
purl pkg:deb/debian/dnspython@2.3.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7493-kzzq-27dw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnspython@2.3.0-1%3Fdistro=trixie
3
url pkg:deb/debian/dnspython@2.7.0-1?distro=trixie
purl pkg:deb/debian/dnspython@2.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnspython@2.7.0-1%3Fdistro=trixie
4
url pkg:deb/debian/dnspython@2.8.0-2?distro=trixie
purl pkg:deb/debian/dnspython@2.8.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dnspython@2.8.0-2%3Fdistro=trixie
aliases CVE-2008-1447
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fbf-8fea-27d9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/dnspython@2.8.0-2%3Fdistro=trixie