Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/refpolicy@2:2.20221101-9?distro=trixie
Typedeb
Namespacedebian
Namerefpolicy
Version2:2.20221101-9
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2:2.20250213-10
Latest_non_vulnerable_version2:2.20250213-12
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-8fbf-8fea-27d9
vulnerability_id VCID-8fbf-8fea-27d9
summary
Two vulnerabilities in dnsmasq might allow for a Denial of Service or
    spoofing of DNS replies.
references
0
reference_url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
reference_id
reference_type
scores
url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
1
reference_url http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
reference_id
reference_type
scores
url http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
2
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
3
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
4
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
5
reference_url http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
6
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
7
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
8
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
9
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
12
reference_url http://marc.info/?l=bugtraq&m=121630706004256&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=121630706004256&w=2
13
reference_url http://marc.info/?l=bugtraq&m=121866517322103&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=121866517322103&w=2
14
reference_url http://marc.info/?l=bugtraq&m=123324863916385&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=123324863916385&w=2
15
reference_url http://marc.info/?l=bugtraq&m=141879471518471&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141879471518471&w=2
16
reference_url http://rhn.redhat.com/errata/RHSA-2008-0533.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0533.html
17
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json
18
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1447
reference_id
reference_type
scores
0
value 0.86697
scoring_system epss
scoring_elements 0.99423
published_at 2026-04-13T12:55:00Z
1
value 0.86697
scoring_system epss
scoring_elements 0.99422
published_at 2026-04-11T12:55:00Z
2
value 0.86697
scoring_system epss
scoring_elements 0.99417
published_at 2026-04-01T12:55:00Z
3
value 0.86697
scoring_system epss
scoring_elements 0.99416
published_at 2026-04-02T12:55:00Z
4
value 0.86697
scoring_system epss
scoring_elements 0.99418
published_at 2026-04-07T12:55:00Z
5
value 0.86697
scoring_system epss
scoring_elements 0.99419
published_at 2026-04-08T12:55:00Z
6
value 0.86697
scoring_system epss
scoring_elements 0.9942
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1447
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
20
reference_url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
reference_id
reference_type
scores
url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
21
reference_url http://secunia.com/advisories/30925
reference_id
reference_type
scores
url http://secunia.com/advisories/30925
22
reference_url http://secunia.com/advisories/30973
reference_id
reference_type
scores
url http://secunia.com/advisories/30973
23
reference_url http://secunia.com/advisories/30977
reference_id
reference_type
scores
url http://secunia.com/advisories/30977
24
reference_url http://secunia.com/advisories/30979
reference_id
reference_type
scores
url http://secunia.com/advisories/30979
25
reference_url http://secunia.com/advisories/30980
reference_id
reference_type
scores
url http://secunia.com/advisories/30980
26
reference_url http://secunia.com/advisories/30988
reference_id
reference_type
scores
url http://secunia.com/advisories/30988
27
reference_url http://secunia.com/advisories/30989
reference_id
reference_type
scores
url http://secunia.com/advisories/30989
28
reference_url http://secunia.com/advisories/30998
reference_id
reference_type
scores
url http://secunia.com/advisories/30998
29
reference_url http://secunia.com/advisories/31011
reference_id
reference_type
scores
url http://secunia.com/advisories/31011
30
reference_url http://secunia.com/advisories/31012
reference_id
reference_type
scores
url http://secunia.com/advisories/31012
31
reference_url http://secunia.com/advisories/31014
reference_id
reference_type
scores
url http://secunia.com/advisories/31014
32
reference_url http://secunia.com/advisories/31019
reference_id
reference_type
scores
url http://secunia.com/advisories/31019
33
reference_url http://secunia.com/advisories/31022
reference_id
reference_type
scores
url http://secunia.com/advisories/31022
34
reference_url http://secunia.com/advisories/31030
reference_id
reference_type
scores
url http://secunia.com/advisories/31030
35
reference_url http://secunia.com/advisories/31031
reference_id
reference_type
scores
url http://secunia.com/advisories/31031
36
reference_url http://secunia.com/advisories/31033
reference_id
reference_type
scores
url http://secunia.com/advisories/31033
37
reference_url http://secunia.com/advisories/31052
reference_id
reference_type
scores
url http://secunia.com/advisories/31052
38
reference_url http://secunia.com/advisories/31065
reference_id
reference_type
scores
url http://secunia.com/advisories/31065
39
reference_url http://secunia.com/advisories/31072
reference_id
reference_type
scores
url http://secunia.com/advisories/31072
40
reference_url http://secunia.com/advisories/31093
reference_id
reference_type
scores
url http://secunia.com/advisories/31093
41
reference_url http://secunia.com/advisories/31094
reference_id
reference_type
scores
url http://secunia.com/advisories/31094
42
reference_url http://secunia.com/advisories/31137
reference_id
reference_type
scores
url http://secunia.com/advisories/31137
43
reference_url http://secunia.com/advisories/31143
reference_id
reference_type
scores
url http://secunia.com/advisories/31143
44
reference_url http://secunia.com/advisories/31151
reference_id
reference_type
scores
url http://secunia.com/advisories/31151
45
reference_url http://secunia.com/advisories/31152
reference_id
reference_type
scores
url http://secunia.com/advisories/31152
46
reference_url http://secunia.com/advisories/31153
reference_id
reference_type
scores
url http://secunia.com/advisories/31153
47
reference_url http://secunia.com/advisories/31169
reference_id
reference_type
scores
url http://secunia.com/advisories/31169
48
reference_url http://secunia.com/advisories/31197
reference_id
reference_type
scores
url http://secunia.com/advisories/31197
49
reference_url http://secunia.com/advisories/31199
reference_id
reference_type
scores
url http://secunia.com/advisories/31199
50
reference_url http://secunia.com/advisories/31204
reference_id
reference_type
scores
url http://secunia.com/advisories/31204
51
reference_url http://secunia.com/advisories/31207
reference_id
reference_type
scores
url http://secunia.com/advisories/31207
52
reference_url http://secunia.com/advisories/31209
reference_id
reference_type
scores
url http://secunia.com/advisories/31209
53
reference_url http://secunia.com/advisories/31212
reference_id
reference_type
scores
url http://secunia.com/advisories/31212
54
reference_url http://secunia.com/advisories/31213
reference_id
reference_type
scores
url http://secunia.com/advisories/31213
55
reference_url http://secunia.com/advisories/31221
reference_id
reference_type
scores
url http://secunia.com/advisories/31221
56
reference_url http://secunia.com/advisories/31236
reference_id
reference_type
scores
url http://secunia.com/advisories/31236
57
reference_url http://secunia.com/advisories/31237
reference_id
reference_type
scores
url http://secunia.com/advisories/31237
58
reference_url http://secunia.com/advisories/31254
reference_id
reference_type
scores
url http://secunia.com/advisories/31254
59
reference_url http://secunia.com/advisories/31326
reference_id
reference_type
scores
url http://secunia.com/advisories/31326
60
reference_url http://secunia.com/advisories/31354
reference_id
reference_type
scores
url http://secunia.com/advisories/31354
61
reference_url http://secunia.com/advisories/31422
reference_id
reference_type
scores
url http://secunia.com/advisories/31422
62
reference_url http://secunia.com/advisories/31430
reference_id
reference_type
scores
url http://secunia.com/advisories/31430
63
reference_url http://secunia.com/advisories/31451
reference_id
reference_type
scores
url http://secunia.com/advisories/31451
64
reference_url http://secunia.com/advisories/31482
reference_id
reference_type
scores
url http://secunia.com/advisories/31482
65
reference_url http://secunia.com/advisories/31495
reference_id
reference_type
scores
url http://secunia.com/advisories/31495
66
reference_url http://secunia.com/advisories/31588
reference_id
reference_type
scores
url http://secunia.com/advisories/31588
67
reference_url http://secunia.com/advisories/31687
reference_id
reference_type
scores
url http://secunia.com/advisories/31687
68
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
69
reference_url http://secunia.com/advisories/31882
reference_id
reference_type
scores
url http://secunia.com/advisories/31882
70
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
71
reference_url http://secunia.com/advisories/33178
reference_id
reference_type
scores
url http://secunia.com/advisories/33178
72
reference_url http://secunia.com/advisories/33714
reference_id
reference_type
scores
url http://secunia.com/advisories/33714
73
reference_url http://secunia.com/advisories/33786
reference_id
reference_type
scores
url http://secunia.com/advisories/33786
74
reference_url http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
reference_id
reference_type
scores
url http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
75
reference_url http://security.gentoo.org/glsa/glsa-200807-08.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200807-08.xml
76
reference_url http://security.gentoo.org/glsa/glsa-200812-17.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-17.xml
77
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
78
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
79
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
80
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
81
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
82
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
83
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
84
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
85
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
86
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
87
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
88
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
89
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
90
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
91
reference_url http://support.citrix.com/article/CTX117991
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX117991
92
reference_url http://support.citrix.com/article/CTX118183
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX118183
93
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
94
reference_url https://www.exploit-db.com/exploits/6122
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6122
95
reference_url https://www.exploit-db.com/exploits/6123
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6123
96
reference_url https://www.exploit-db.com/exploits/6130
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6130
97
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
98
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
99
reference_url https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
100
reference_url http://up2date.astaro.com/2008/08/up2date_7202_released.html
reference_id
reference_type
scores
url http://up2date.astaro.com/2008/08/up2date_7202_released.html
101
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
102
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
103
reference_url http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
reference_id
reference_type
scores
url http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
104
reference_url http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
reference_id
reference_type
scores
url http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
105
reference_url http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
reference_id
reference_type
scores
url http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
106
reference_url http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
reference_id
reference_type
scores
url http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
107
reference_url http://www.debian.org/security/2008/dsa-1603
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1603
108
reference_url http://www.debian.org/security/2008/dsa-1604
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1604
109
reference_url http://www.debian.org/security/2008/dsa-1605
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1605
110
reference_url http://www.debian.org/security/2008/dsa-1619
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1619
111
reference_url http://www.debian.org/security/2008/dsa-1623
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1623
112
reference_url http://www.doxpara.com/DMK_BO2K8.ppt
reference_id
reference_type
scores
url http://www.doxpara.com/DMK_BO2K8.ppt
113
reference_url http://www.doxpara.com/?p=1176
reference_id
reference_type
scores
url http://www.doxpara.com/?p=1176
114
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
115
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
116
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
117
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
118
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
119
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
120
reference_url http://www.ipcop.org/index.php?name=News&file=article&sid=40
reference_id
reference_type
scores
url http://www.ipcop.org/index.php?name=News&file=article&sid=40
121
reference_url http://www.isc.org/index.pl?/sw/bind/bind-security.php
reference_id
reference_type
scores
url http://www.isc.org/index.pl?/sw/bind/bind-security.php
122
reference_url http://www.kb.cert.org/vuls/id/800113
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/800113
123
reference_url http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
124
reference_url http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
125
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
126
reference_url http://www.nominum.com/asset_upload_file741_2661.pdf
reference_id
reference_type
scores
url http://www.nominum.com/asset_upload_file741_2661.pdf
127
reference_url http://www.novell.com/support/viewContent.do?externalId=7000912
reference_id
reference_type
scores
url http://www.novell.com/support/viewContent.do?externalId=7000912
128
reference_url http://www.openbsd.org/errata42.html#013_bind
reference_id
reference_type
scores
url http://www.openbsd.org/errata42.html#013_bind
129
reference_url http://www.openbsd.org/errata43.html#004_bind
reference_id
reference_type
scores
url http://www.openbsd.org/errata43.html#004_bind
130
reference_url http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
reference_id
reference_type
scores
url http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
131
reference_url http://www.phys.uu.nl/~rombouts/pdnsd.html
reference_id
reference_type
scores
url http://www.phys.uu.nl/~rombouts/pdnsd.html
132
reference_url http://www.redhat.com/support/errata/RHSA-2008-0789.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0789.html
133
reference_url http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
reference_id
reference_type
scores
url http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
134
reference_url http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
reference_id
reference_type
scores
url http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
135
reference_url http://www.securityfocus.com/archive/1/495289/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495289/100/0/threaded
136
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
137
reference_url http://www.securityfocus.com/bid/30131
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30131
138
reference_url http://www.securitytracker.com/id?1020437
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020437
139
reference_url http://www.securitytracker.com/id?1020438
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020438
140
reference_url http://www.securitytracker.com/id?1020440
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020440
141
reference_url http://www.securitytracker.com/id?1020448
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020448
142
reference_url http://www.securitytracker.com/id?1020449
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020449
143
reference_url http://www.securitytracker.com/id?1020548
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020548
144
reference_url http://www.securitytracker.com/id?1020558
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020558
145
reference_url http://www.securitytracker.com/id?1020560
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020560
146
reference_url http://www.securitytracker.com/id?1020561
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020561
147
reference_url http://www.securitytracker.com/id?1020575
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020575
148
reference_url http://www.securitytracker.com/id?1020576
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020576
149
reference_url http://www.securitytracker.com/id?1020577
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020577
150
reference_url http://www.securitytracker.com/id?1020578
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020578
151
reference_url http://www.securitytracker.com/id?1020579
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020579
152
reference_url http://www.securitytracker.com/id?1020651
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020651
153
reference_url http://www.securitytracker.com/id?1020653
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020653
154
reference_url http://www.securitytracker.com/id?1020702
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020702
155
reference_url http://www.securitytracker.com/id?1020802
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020802
156
reference_url http://www.securitytracker.com/id?1020804
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020804
157
reference_url http://www.ubuntu.com/usn/usn-622-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-622-1
158
reference_url http://www.ubuntu.com/usn/usn-627-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-627-1
159
reference_url http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
reference_id
reference_type
scores
url http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
160
reference_url http://www.us-cert.gov/cas/techalerts/TA08-190A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-190A.html
161
reference_url http://www.us-cert.gov/cas/techalerts/TA08-190B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-190B.html
162
reference_url http://www.us-cert.gov/cas/techalerts/TA08-260A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-260A.html
163
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
164
reference_url http://www.vupen.com/english/advisories/2008/2019/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2019/references
165
reference_url http://www.vupen.com/english/advisories/2008/2023/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2023/references
166
reference_url http://www.vupen.com/english/advisories/2008/2025/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2025/references
167
reference_url http://www.vupen.com/english/advisories/2008/2029/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2029/references
168
reference_url http://www.vupen.com/english/advisories/2008/2030/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2030/references
169
reference_url http://www.vupen.com/english/advisories/2008/2050/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2050/references
170
reference_url http://www.vupen.com/english/advisories/2008/2051/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2051/references
171
reference_url http://www.vupen.com/english/advisories/2008/2052/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2052/references
172
reference_url http://www.vupen.com/english/advisories/2008/2055/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2055/references
173
reference_url http://www.vupen.com/english/advisories/2008/2092/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2092/references
174
reference_url http://www.vupen.com/english/advisories/2008/2113/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2113/references
175
reference_url http://www.vupen.com/english/advisories/2008/2114/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2114/references
176
reference_url http://www.vupen.com/english/advisories/2008/2123/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2123/references
177
reference_url http://www.vupen.com/english/advisories/2008/2139/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2139/references
178
reference_url http://www.vupen.com/english/advisories/2008/2166/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2166/references
179
reference_url http://www.vupen.com/english/advisories/2008/2195/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2195/references
180
reference_url http://www.vupen.com/english/advisories/2008/2196/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2196/references
181
reference_url http://www.vupen.com/english/advisories/2008/2197/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2197/references
182
reference_url http://www.vupen.com/english/advisories/2008/2268
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2268
183
reference_url http://www.vupen.com/english/advisories/2008/2291
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2291
184
reference_url http://www.vupen.com/english/advisories/2008/2334
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2334
185
reference_url http://www.vupen.com/english/advisories/2008/2342
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2342
186
reference_url http://www.vupen.com/english/advisories/2008/2377
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2377
187
reference_url http://www.vupen.com/english/advisories/2008/2383
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2383
188
reference_url http://www.vupen.com/english/advisories/2008/2384
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2384
189
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
190
reference_url http://www.vupen.com/english/advisories/2008/2467
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2467
191
reference_url http://www.vupen.com/english/advisories/2008/2482
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2482
192
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
193
reference_url http://www.vupen.com/english/advisories/2008/2549
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2549
194
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
195
reference_url http://www.vupen.com/english/advisories/2008/2582
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2582
196
reference_url http://www.vupen.com/english/advisories/2008/2584
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2584
197
reference_url http://www.vupen.com/english/advisories/2009/0297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0297
198
reference_url http://www.vupen.com/english/advisories/2009/0311
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0311
199
reference_url http://www.vupen.com/english/advisories/2010/0622
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0622
200
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=449345
reference_id 449345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=449345
201
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123
reference_id 490123
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123
202
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465
reference_id 492465
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465
203
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
reference_id 492698
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
204
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700
reference_id 492700
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700
205
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599
reference_id 493599
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1447
reference_id CVE-2008-1447
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-1447
242
reference_url https://security.gentoo.org/glsa/200807-08
reference_id GLSA-200807-08
reference_type
scores
url https://security.gentoo.org/glsa/200807-08
243
reference_url https://security.gentoo.org/glsa/200809-02
reference_id GLSA-200809-02
reference_type
scores
url https://security.gentoo.org/glsa/200809-02
244
reference_url https://security.gentoo.org/glsa/200812-17
reference_id GLSA-200812-17
reference_type
scores
url https://security.gentoo.org/glsa/200812-17
245
reference_url https://security.gentoo.org/glsa/200901-03
reference_id GLSA-200901-03
reference_type
scores
url https://security.gentoo.org/glsa/200901-03
246
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
247
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb
248
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py
249
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232;OSVDB-46776
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c
250
reference_url https://access.redhat.com/errata/RHSA-2008:0533
reference_id RHSA-2008:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0533
251
reference_url https://access.redhat.com/errata/RHSA-2008:0789
reference_id RHSA-2008:0789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0789
252
reference_url https://usn.ubuntu.com/622-1/
reference_id USN-622-1
reference_type
scores
url https://usn.ubuntu.com/622-1/
253
reference_url https://usn.ubuntu.com/627-1/
reference_id USN-627-1
reference_type
scores
url https://usn.ubuntu.com/627-1/
fixed_packages
0
url pkg:deb/debian/refpolicy@2:0.0.20080702-1?distro=trixie
purl pkg:deb/debian/refpolicy@2:0.0.20080702-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:0.0.20080702-1%3Fdistro=trixie
1
url pkg:deb/debian/refpolicy@2:2.20210203-7?distro=trixie
purl pkg:deb/debian/refpolicy@2:2.20210203-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20210203-7%3Fdistro=trixie
2
url pkg:deb/debian/refpolicy@2:2.20221101-9?distro=trixie
purl pkg:deb/debian/refpolicy@2:2.20221101-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20221101-9%3Fdistro=trixie
3
url pkg:deb/debian/refpolicy@2:2.20250213-10?distro=trixie
purl pkg:deb/debian/refpolicy@2:2.20250213-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20250213-10%3Fdistro=trixie
4
url pkg:deb/debian/refpolicy@2:2.20250213-11?distro=trixie
purl pkg:deb/debian/refpolicy@2:2.20250213-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20250213-11%3Fdistro=trixie
5
url pkg:deb/debian/refpolicy@2:2.20250213-12?distro=trixie
purl pkg:deb/debian/refpolicy@2:2.20250213-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20250213-12%3Fdistro=trixie
aliases CVE-2008-1447
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fbf-8fea-27d9
1
url VCID-bd7h-pr64-2qcg
vulnerability_id VCID-bd7h-pr64-2qcg
summary selinux-policy: SELinux prevents pam-u2f to work correctly, disabling the 2nd factor during authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24612.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24612
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15899
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15963
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16027
published_at 2026-04-04T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15827
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15912
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15975
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15954
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15915
published_at 2026-04-12T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15847
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24612
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1871217
reference_id 1871217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1871217
fixed_packages
0
url pkg:deb/debian/refpolicy@0?distro=trixie
purl pkg:deb/debian/refpolicy@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@0%3Fdistro=trixie
1
url pkg:deb/debian/refpolicy@2:2.20210203-7?distro=trixie
purl pkg:deb/debian/refpolicy@2:2.20210203-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20210203-7%3Fdistro=trixie
2
url pkg:deb/debian/refpolicy@2:2.20221101-9?distro=trixie
purl pkg:deb/debian/refpolicy@2:2.20221101-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20221101-9%3Fdistro=trixie
3
url pkg:deb/debian/refpolicy@2:2.20250213-10?distro=trixie
purl pkg:deb/debian/refpolicy@2:2.20250213-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20250213-10%3Fdistro=trixie
4
url pkg:deb/debian/refpolicy@2:2.20250213-11?distro=trixie
purl pkg:deb/debian/refpolicy@2:2.20250213-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20250213-11%3Fdistro=trixie
5
url pkg:deb/debian/refpolicy@2:2.20250213-12?distro=trixie
purl pkg:deb/debian/refpolicy@2:2.20250213-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20250213-12%3Fdistro=trixie
aliases CVE-2020-24612
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bd7h-pr64-2qcg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/refpolicy@2:2.20221101-9%3Fdistro=trixie