{"url":"http://public2.vulnerablecode.io/api/packages/74109?format=json","purl":"pkg:ebuild/net-dns/bind@9.4.2_p1","type":"ebuild","namespace":"net-dns","name":"bind","version":"9.4.2_p1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"9.4.3_p1","latest_non_vulnerable_version":"9.16.33","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31420?format=json","vulnerability_id":"VCID-8fbf-8fea-27d9","summary":"Two vulnerabilities in dnsmasq might allow for a Denial of Service or\n    spoofing of DNS replies.","references":[{"reference_url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"},{"reference_url":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html","reference_id":"","reference_type":"","scores":[],"url":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=121866517322103&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=121866517322103&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0533.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0533.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1447","reference_id":"","reference_type":"","scores":[{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99423","published_at":"2026-04-13T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99417","published_at":"2026-04-01T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99416","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99418","published_at":"2026-04-07T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.9942","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447"},{"reference_url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037","reference_id":"","reference_type":"","scores":[],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"},{"reference_url":"http://secunia.com/advisories/30925","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30925"},{"reference_url":"http://secunia.com/advisories/30973","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30973"},{"reference_url":"http://secunia.com/advisories/30977","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30977"},{"reference_url":"http://secunia.com/advisories/30979","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30979"},{"reference_url":"http://secunia.com/advisories/30980","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30980"},{"reference_url":"http://secunia.com/advisories/30988","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30988"},{"reference_url":"http://secunia.com/advisories/30989","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30989"},{"reference_url":"http://secunia.com/advisories/30998","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30998"},{"reference_url":"http://secunia.com/advisories/31011","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31011"},{"reference_url":"http://secunia.com/advisories/31012","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31012"},{"reference_url":"http://secunia.com/advisories/31014","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31014"},{"reference_url":"http://secunia.com/advisories/31019","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31019"},{"reference_url":"http://secunia.com/advisories/31022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31022"},{"reference_url":"http://secunia.com/advisories/31030","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31030"},{"reference_url":"http://secunia.com/advisories/31031","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31031"},{"reference_url":"http://secunia.com/advisories/31033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31033"},{"reference_url":"http://secunia.com/advisories/31052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31052"},{"reference_url":"http://secunia.com/advisories/31065","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31065"},{"reference_url":"http://secunia.com/advisories/31072","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31072"},{"reference_url":"http://secunia.com/advisories/31093","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31093"},{"reference_url":"http://secunia.com/advisories/31094","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31094"},{"reference_url":"http://secunia.com/advisories/31137","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31137"},{"reference_url":"http://secunia.com/advisories/31143","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31143"},{"reference_url":"http://secunia.com/advisories/31151","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31151"},{"reference_url":"http://secunia.com/advisories/31152","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31152"},{"reference_url":"http://secunia.com/advisories/31153","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31153"},{"reference_url":"http://secunia.com/advisories/31169","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31169"},{"reference_url":"http://secunia.com/advisories/31197","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31197"},{"reference_url":"http://secunia.com/advisories/31199","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31199"},{"reference_url":"http://secunia.com/advisories/31204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31204"},{"reference_url":"http://secunia.com/advisories/31207","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31207"},{"reference_url":"http://secunia.com/advisories/31209","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31209"},{"reference_url":"http://secunia.com/advisories/31212","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31212"},{"reference_url":"http://secunia.com/advisories/31213","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31213"},{"reference_url":"http://secunia.com/advisories/31221","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31221"},{"reference_url":"http://secunia.com/advisories/31236","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31236"},{"reference_url":"http://secunia.com/advisories/31237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31237"},{"reference_url":"http://secunia.com/advisories/31254","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31254"},{"reference_url":"http://secunia.com/advisories/31326","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31326"},{"reference_url":"http://secunia.com/advisories/31354","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31354"},{"reference_url":"http://secunia.com/advisories/31422","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31422"},{"reference_url":"http://secunia.com/advisories/31430","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31430"},{"reference_url":"http://secunia.com/advisories/31451","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31451"},{"reference_url":"http://secunia.com/advisories/31482","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31482"},{"reference_url":"http://secunia.com/advisories/31495","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31495"},{"reference_url":"http://secunia.com/advisories/31588","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31588"},{"reference_url":"http://secunia.com/advisories/31687","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31687"},{"reference_url":"http://secunia.com/advisories/31823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31823"},{"reference_url":"http://secunia.com/advisories/31882","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31882"},{"reference_url":"http://secunia.com/advisories/31900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31900"},{"reference_url":"http://secunia.com/advisories/33178","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33178"},{"reference_url":"http://secunia.com/advisories/33714","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33714"},{"reference_url":"http://secunia.com/advisories/33786","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33786"},{"reference_url":"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc","reference_id":"","reference_type":"","scores":[],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200807-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200807-08.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200812-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200812-17.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"},{"reference_url":"http://support.apple.com/kb/HT3026","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3026"},{"reference_url":"http://support.apple.com/kb/HT3129","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3129"},{"reference_url":"http://support.citrix.com/article/CTX117991","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX117991"},{"reference_url":"http://support.citrix.com/article/CTX118183","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX118183"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152"},{"reference_url":"https://www.exploit-db.com/exploits/6122","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/6122"},{"reference_url":"https://www.exploit-db.com/exploits/6123","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/6123"},{"reference_url":"https://www.exploit-db.com/exploits/6130","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/6130"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"},{"reference_url":"https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"},{"reference_url":"http://up2date.astaro.com/2008/08/up2date_7202_released.html","reference_id":"","reference_type":"","scores":[],"url":"http://up2date.astaro.com/2008/08/up2date_7202_released.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"},{"reference_url":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning","reference_id":"","reference_type":"","scores":[],"url":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"},{"reference_url":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"},{"reference_url":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"},{"reference_url":"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"},{"reference_url":"http://www.debian.org/security/2008/dsa-1603","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1603"},{"reference_url":"http://www.debian.org/security/2008/dsa-1604","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1604"},{"reference_url":"http://www.debian.org/security/2008/dsa-1605","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1605"},{"reference_url":"http://www.debian.org/security/2008/dsa-1619","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1619"},{"reference_url":"http://www.debian.org/security/2008/dsa-1623","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1623"},{"reference_url":"http://www.doxpara.com/DMK_BO2K8.ppt","reference_id":"","reference_type":"","scores":[],"url":"http://www.doxpara.com/DMK_BO2K8.ppt"},{"reference_url":"http://www.doxpara.com/?p=1176","reference_id":"","reference_type":"","scores":[],"url":"http://www.doxpara.com/?p=1176"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"},{"reference_url":"http://www.ipcop.org/index.php?name=News&file=article&sid=40","reference_id":"","reference_type":"","scores":[],"url":"http://www.ipcop.org/index.php?name=News&file=article&sid=40"},{"reference_url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php"},{"reference_url":"http://www.kb.cert.org/vuls/id/800113","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/800113"},{"reference_url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"},{"reference_url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"},{"reference_url":"http://www.nominum.com/asset_upload_file741_2661.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.nominum.com/asset_upload_file741_2661.pdf"},{"reference_url":"http://www.novell.com/support/viewContent.do?externalId=7000912","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/support/viewContent.do?externalId=7000912"},{"reference_url":"http://www.openbsd.org/errata42.html#013_bind","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata42.html#013_bind"},{"reference_url":"http://www.openbsd.org/errata43.html#004_bind","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata43.html#004_bind"},{"reference_url":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog","reference_id":"","reference_type":"","scores":[],"url":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"},{"reference_url":"http://www.phys.uu.nl/~rombouts/pdnsd.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.phys.uu.nl/~rombouts/pdnsd.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0789.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0789.html"},{"reference_url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"},{"reference_url":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/","reference_id":"","reference_type":"","scores":[],"url":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"},{"reference_url":"http://www.securityfocus.com/archive/1/495289/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495289/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/30131","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30131"},{"reference_url":"http://www.securitytracker.com/id?1020437","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020437"},{"reference_url":"http://www.securitytracker.com/id?1020438","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020438"},{"reference_url":"http://www.securitytracker.com/id?1020440","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020440"},{"reference_url":"http://www.securitytracker.com/id?1020448","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020448"},{"reference_url":"http://www.securitytracker.com/id?1020449","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020449"},{"reference_url":"http://www.securitytracker.com/id?1020548","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020548"},{"reference_url":"http://www.securitytracker.com/id?1020558","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020558"},{"reference_url":"http://www.securitytracker.com/id?1020560","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020560"},{"reference_url":"http://www.securitytracker.com/id?1020561","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020561"},{"reference_url":"http://www.securitytracker.com/id?1020575","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020575"},{"reference_url":"http://www.securitytracker.com/id?1020576","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020576"},{"reference_url":"http://www.securitytracker.com/id?1020577","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020577"},{"reference_url":"http://www.securitytracker.com/id?1020578","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020578"},{"reference_url":"http://www.securitytracker.com/id?1020579","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020579"},{"reference_url":"http://www.securitytracker.com/id?1020651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020651"},{"reference_url":"http://www.securitytracker.com/id?1020653","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020653"},{"reference_url":"http://www.securitytracker.com/id?1020702","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020702"},{"reference_url":"http://www.securitytracker.com/id?1020802","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020802"},{"reference_url":"http://www.securitytracker.com/id?1020804","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020804"},{"reference_url":"http://www.ubuntu.com/usn/usn-622-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-622-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-627-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-627-1"},{"reference_url":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2019/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2019/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2023/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2023/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2025/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2025/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2029/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2029/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2030/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2030/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2050/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2050/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2051/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2051/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2052/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2052/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2055/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2055/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2092/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2092/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2113/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2113/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2114/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2114/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2123/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2123/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2139/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2139/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2166/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2166/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2195/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2195/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2196/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2196/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2197/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2197/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2268","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2268"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2291","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2291"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2334","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2334"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2342","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2342"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2377","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2377"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2383","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2383"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2384","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2384"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2466","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2467","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2467"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2482","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2482"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2525","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2549","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2549"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2558","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2582","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2582"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2584","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2584"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0297","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0297"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0311","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0311"},{"reference_url":"http://www.vupen.com/english/advisories/2010/0622","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/0622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=449345","reference_id":"449345","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=449345"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123","reference_id":"490123","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465","reference_id":"492465","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698","reference_id":"492698","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700","reference_id":"492700","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599","reference_id":"493599","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1447","reference_id":"CVE-2008-1447","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1447"},{"reference_url":"https://security.gentoo.org/glsa/200807-08","reference_id":"GLSA-200807-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200807-08"},{"reference_url":"https://security.gentoo.org/glsa/200809-02","reference_id":"GLSA-200809-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200809-02"},{"reference_url":"https://security.gentoo.org/glsa/200812-17","reference_id":"GLSA-200812-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200812-17"},{"reference_url":"https://security.gentoo.org/glsa/200901-03","reference_id":"GLSA-200901-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200901-03"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb","reference_id":"OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py","reference_id":"OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c","reference_id":"OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232;OSVDB-46776","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0533","reference_id":"RHSA-2008:0533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0789","reference_id":"RHSA-2008:0789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0789"},{"reference_url":"https://usn.ubuntu.com/622-1/","reference_id":"USN-622-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/622-1/"},{"reference_url":"https://usn.ubuntu.com/627-1/","reference_id":"USN-627-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/627-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74109?format=json","purl":"pkg:ebuild/net-dns/bind@9.4.2_p1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.4.2_p1"}],"aliases":["CVE-2008-1447"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fbf-8fea-27d9"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-dns/bind@9.4.2_p1"}