Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-1447

Summary
Assigner-microsoft
Assigner Org ID-f38d906d-7342-40ea-92c1-6c4a2c6478c8
Published At-08 Jul, 2008 | 23:00
Updated At-07 Aug, 2024 | 08:24
Rejected At-
Credits

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:microsoft
Assigner Org ID:f38d906d-7342-40ea-92c1-6c4a2c6478c8
Published At:08 Jul, 2008 | 23:00
Updated At:07 Aug, 2024 | 08:24
Rejected At:
â–¼CVE Numbering Authority (CNA)

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securitytracker.com/id?1020438
vdb-entry
x_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
vendor-advisory
x_refsource_FEDORA
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
vendor-advisory
x_refsource_SUSE
http://www.kb.cert.org/vuls/id/800113
third-party-advisory
x_refsource_CERT-VN
http://secunia.com/advisories/31137
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31430
third-party-advisory
x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
x_refsource_CONFIRM
http://secunia.com/advisories/31169
third-party-advisory
x_refsource_SECUNIA
http://www.phys.uu.nl/~rombouts/pdnsd.html
x_refsource_CONFIRM
http://www.securitytracker.com/id?1020702
vdb-entry
x_refsource_SECTRACK
http://security.gentoo.org/glsa/glsa-201209-25.xml
vendor-advisory
x_refsource_GENTOO
http://www.vupen.com/english/advisories/2008/2052/references
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020561
vdb-entry
x_refsource_SECTRACK
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
http://www.securitytracker.com/id?1020578
vdb-entry
x_refsource_SECTRACK
http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
vendor-advisory
x_refsource_FREEBSD
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
vdb-entry
signature
x_refsource_OVAL
http://www.securitytracker.com/id?1020802
vdb-entry
x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
http://www.securityfocus.com/bid/30131
vdb-entry
x_refsource_BID
http://www.openbsd.org/errata42.html#013_bind
vendor-advisory
x_refsource_OPENBSD
http://secunia.com/advisories/31236
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
vendor-advisory
x_refsource_APPLE
http://www.securitytracker.com/id?1020651
vdb-entry
x_refsource_SECTRACK
http://www.securitytracker.com/id?1020437
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31209
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31012
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31151
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2050/references
vdb-entry
x_refsource_VUPEN
http://support.citrix.com/article/CTX117991
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/31237
third-party-advisory
x_refsource_SECUNIA
http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
vendor-advisory
x_refsource_APPLE
https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
vdb-entry
x_refsource_XF
http://secunia.com/advisories/31495
third-party-advisory
x_refsource_SECUNIA
https://www.exploit-db.com/exploits/6130
exploit
x_refsource_EXPLOIT-DB
http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
vendor-advisory
x_refsource_CISCO
http://www.securitytracker.com/id?1020579
vdb-entry
x_refsource_SECTRACK
http://www.nominum.com/asset_upload_file741_2661.pdf
x_refsource_MISC
http://www.securitytracker.com/id?1020653
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/30998
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1603
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2525
vdb-entry
x_refsource_VUPEN
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/31094
third-party-advisory
x_refsource_SECUNIA
http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
vendor-advisory
x_refsource_AIXAPAR
http://secunia.com/advisories/31687
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2025/references
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
vendor-advisory
x_refsource_SUNALERT
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
third-party-advisory
x_refsource_CERT
http://secunia.com/advisories/31588
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31019
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2029/references
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
https://www.exploit-db.com/exploits/6123
exploit
x_refsource_EXPLOIT-DB
http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
vendor-advisory
x_refsource_AIXAPAR
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
vendor-advisory
x_refsource_FEDORA
http://www.vupen.com/english/advisories/2008/2268
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2009/0297
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/31207
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31031
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2584
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31451
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2051/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/30977
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0789.html
vendor-advisory
x_refsource_REDHAT
http://www.vupen.com/english/advisories/2008/2377
vdb-entry
x_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
http://www.securitytracker.com/id?1020558
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31221
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2008-0533.html
vendor-advisory
x_refsource_REDHAT
http://www.openbsd.org/errata43.html#004_bind
vendor-advisory
x_refsource_OPENBSD
http://www.securitytracker.com/id?1020804
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31143
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/495289/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/2195/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2196/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/33714
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=121866517322103&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/33786
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1020448
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31882
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2384
vdb-entry
x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
vendor-advisory
x_refsource_AIXAPAR
http://up2date.astaro.com/2008/08/up2date_7202_released.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2123/references
vdb-entry
x_refsource_VUPEN
http://support.apple.com/kb/HT3026
x_refsource_CONFIRM
http://secunia.com/advisories/31014
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30979
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1020575
vdb-entry
x_refsource_SECTRACK
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2482
vdb-entry
x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
vendor-advisory
x_refsource_AIXAPAR
http://support.apple.com/kb/HT3129
x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1619
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2166/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31072
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2139/references
vdb-entry
x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
vdb-entry
signature
x_refsource_OVAL
http://www.vupen.com/english/advisories/2008/2092/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31482
third-party-advisory
x_refsource_SECUNIA
http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
vendor-advisory
x_refsource_AIXAPAR
http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
vendor-advisory
x_refsource_MANDRIVA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/30989
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2055/references
vdb-entry
x_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
x_refsource_CONFIRM
http://www.ipcop.org/index.php?name=News&file=article&sid=40
x_refsource_CONFIRM
http://secunia.com/advisories/31065
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31254
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/495869/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.doxpara.com/?p=1176
x_refsource_MISC
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
vendor-advisory
x_refsource_NETBSD
http://www.ubuntu.com/usn/usn-627-1
vendor-advisory
x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2010/0622
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020576
vdb-entry
x_refsource_SECTRACK
http://www.isc.org/index.pl?/sw/bind/bind-security.php
x_refsource_CONFIRM
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/31153
third-party-advisory
x_refsource_SECUNIA
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2549
vdb-entry
x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
vendor-advisory
x_refsource_AIXAPAR
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
x_refsource_CONFIRM
http://secunia.com/advisories/31213
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31030
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-622-1
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/31033
third-party-advisory
x_refsource_SECUNIA
http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
x_refsource_MISC
http://www.securitytracker.com/id?1020440
vdb-entry
x_refsource_SECTRACK
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
vendor-advisory
x_refsource_APPLE
http://www.doxpara.com/DMK_BO2K8.ppt
x_refsource_MISC
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
mailing-list
x_refsource_FULLDISC
http://www.debian.org/security/2008/dsa-1604
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/31823
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31326
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2558
vdb-entry
x_refsource_VUPEN
https://www.exploit-db.com/exploits/6122
exploit
x_refsource_EXPLOIT-DB
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
vdb-entry
signature
x_refsource_OVAL
http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2008/2383
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020560
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31900
third-party-advisory
x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
x_refsource_CONFIRM
http://support.citrix.com/article/CTX118183
x_refsource_CONFIRM
http://secunia.com/advisories/30925
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/0311
vdb-entry
x_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1623
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2582
vdb-entry
x_refsource_VUPEN
http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
x_refsource_MISC
http://www.debian.org/security/2008/dsa-1605
vendor-advisory
x_refsource_DEBIAN
http://www.novell.com/support/viewContent.do?externalId=7000912
x_refsource_CONFIRM
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2342
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2114/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/30973
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31204
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31354
third-party-advisory
x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200812-17.xml
vendor-advisory
x_refsource_GENTOO
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/33178
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30988
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/31011
third-party-advisory
x_refsource_SECUNIA
http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
x_refsource_MISC
http://www.vupen.com/english/advisories/2008/2334
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020577
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31422
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31197
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1020548
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/2467
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
vendor-advisory
x_refsource_SUNALERT
http://www.us-cert.gov/cas/techalerts/TA08-190B.html
third-party-advisory
x_refsource_CERT
http://www.us-cert.gov/cas/techalerts/TA08-190A.html
third-party-advisory
x_refsource_CERT
http://security.gentoo.org/glsa/glsa-200807-08.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/31022
third-party-advisory
x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
vendor-advisory
x_refsource_SLACKWARE
http://www.securitytracker.com/id?1020449
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31093
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31052
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30980
third-party-advisory
x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
vendor-advisory
x_refsource_SLACKWARE
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
x_refsource_CONFIRM
http://secunia.com/advisories/31199
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2030/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2291
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2023/references
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
http://www.vupen.com/english/advisories/2008/2466
vdb-entry
x_refsource_VUPEN
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
vendor-advisory
x_refsource_MS
http://secunia.com/advisories/31212
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2113/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31152
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2019/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2197/references
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020438
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.kb.cert.org/vuls/id/800113
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://secunia.com/advisories/31137
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31430
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31169
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id?1020702
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.vupen.com/english/advisories/2008/2052/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020561
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securitytracker.com/id?1020578
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.securitytracker.com/id?1020802
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securityfocus.com/bid/30131
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.openbsd.org/errata42.html#013_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://secunia.com/advisories/31236
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.securitytracker.com/id?1020651
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securitytracker.com/id?1020437
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31209
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31012
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31151
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2050/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://support.citrix.com/article/CTX117991
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/31237
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/31495
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.exploit-db.com/exploits/6130
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://www.securitytracker.com/id?1020579
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.nominum.com/asset_upload_file741_2661.pdf
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id?1020653
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/30998
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2008/dsa-1603
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/31094
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://secunia.com/advisories/31687
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2025/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://secunia.com/advisories/31588
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31019
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2029/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://www.exploit-db.com/exploits/6123
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.vupen.com/english/advisories/2008/2268
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2009/0297
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/31207
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31031
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2584
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31451
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2051/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/30977
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0789.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.vupen.com/english/advisories/2008/2377
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securitytracker.com/id?1020558
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31221
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0533.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.openbsd.org/errata43.html#004_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://www.securitytracker.com/id?1020804
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31143
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/495289/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.vupen.com/english/advisories/2008/2195/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2196/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/33714
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=121866517322103&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/33786
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1020448
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31882
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2384
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://up2date.astaro.com/2008/08/up2date_7202_released.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2123/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://support.apple.com/kb/HT3026
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31014
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30979
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1020575
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2482
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://support.apple.com/kb/HT3129
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2008/dsa-1619
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2008/2166/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31072
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2139/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.vupen.com/english/advisories/2008/2092/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31482
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/30989
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2055/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=40
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31065
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31254
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.doxpara.com/?p=1176
Resource:
x_refsource_MISC
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
Hyperlink: http://www.ubuntu.com/usn/usn-627-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.vupen.com/english/advisories/2010/0622
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020576
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Resource:
x_refsource_CONFIRM
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/31153
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2549
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31213
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31030
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-622-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/31033
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id?1020440
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.doxpara.com/DMK_BO2K8.ppt
Resource:
x_refsource_MISC
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://www.debian.org/security/2008/dsa-1604
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/31823
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31326
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://www.exploit-db.com/exploits/6122
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2008/2383
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020560
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31900
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.citrix.com/article/CTX118183
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30925
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2009/0311
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2008/dsa-1623
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2008/2582
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
Resource:
x_refsource_MISC
Hyperlink: http://www.debian.org/security/2008/dsa-1605
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.novell.com/support/viewContent.do?externalId=7000912
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2342
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2114/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/30973
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31204
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31354
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/33178
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30988
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/31011
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
Resource:
x_refsource_MISC
Hyperlink: http://www.vupen.com/english/advisories/2008/2334
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020577
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31422
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31197
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1020548
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2008/2467
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190B.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://security.gentoo.org/glsa/glsa-200807-08.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/31022
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.securitytracker.com/id?1020449
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31093
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31052
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30980
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31199
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2030/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2291
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2023/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
Resource:
vendor-advisory
x_refsource_MS
Hyperlink: http://secunia.com/advisories/31212
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2113/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31152
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2019/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2197/references
Resource:
vdb-entry
x_refsource_VUPEN
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securitytracker.com/id?1020438
vdb-entry
x_refsource_SECTRACK
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.kb.cert.org/vuls/id/800113
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://secunia.com/advisories/31137
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31430
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31169
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.phys.uu.nl/~rombouts/pdnsd.html
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id?1020702
vdb-entry
x_refsource_SECTRACK
x_transferred
http://security.gentoo.org/glsa/glsa-201209-25.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.vupen.com/english/advisories/2008/2052/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020561
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.securitytracker.com/id?1020578
vdb-entry
x_refsource_SECTRACK
x_transferred
http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.securitytracker.com/id?1020802
vdb-entry
x_refsource_SECTRACK
x_transferred
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.securityfocus.com/bid/30131
vdb-entry
x_refsource_BID
x_transferred
http://www.openbsd.org/errata42.html#013_bind
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://secunia.com/advisories/31236
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.securitytracker.com/id?1020651
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securitytracker.com/id?1020437
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31209
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31012
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31151
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2050/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://support.citrix.com/article/CTX117991
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/31237
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/31495
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.exploit-db.com/exploits/6130
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
vendor-advisory
x_refsource_CISCO
x_transferred
http://www.securitytracker.com/id?1020579
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.nominum.com/asset_upload_file741_2661.pdf
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id?1020653
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/30998
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2008/dsa-1603
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2008/2525
vdb-entry
x_refsource_VUPEN
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/31094
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://secunia.com/advisories/31687
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2025/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://secunia.com/advisories/31588
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31019
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2029/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
x_transferred
https://www.exploit-db.com/exploits/6123
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
vendor-advisory
x_refsource_AIXAPAR
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.vupen.com/english/advisories/2008/2268
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2009/0297
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/31207
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31031
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2584
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31451
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2051/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/30977
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0789.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.vupen.com/english/advisories/2008/2377
vdb-entry
x_refsource_VUPEN
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
x_transferred
http://www.securitytracker.com/id?1020558
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31221
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2008-0533.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.openbsd.org/errata43.html#004_bind
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://www.securitytracker.com/id?1020804
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31143
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/495289/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.vupen.com/english/advisories/2008/2195/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2196/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/33714
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=121866517322103&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/33786
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1020448
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31882
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2384
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://up2date.astaro.com/2008/08/up2date_7202_released.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2123/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://support.apple.com/kb/HT3026
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31014
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30979
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1020575
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2482
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://support.apple.com/kb/HT3129
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2008/dsa-1619
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2008/2166/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31072
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2139/references
vdb-entry
x_refsource_VUPEN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.vupen.com/english/advisories/2008/2092/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31482
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/30989
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2055/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
x_transferred
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
x_refsource_CONFIRM
x_transferred
http://www.ipcop.org/index.php?name=News&file=article&sid=40
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31065
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31254
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/495869/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.doxpara.com/?p=1176
x_refsource_MISC
x_transferred
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
vendor-advisory
x_refsource_NETBSD
x_transferred
http://www.ubuntu.com/usn/usn-627-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.vupen.com/english/advisories/2010/0622
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020576
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.isc.org/index.pl?/sw/bind/bind-security.php
x_refsource_CONFIRM
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/31153
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2549
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31213
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31030
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-622-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/31033
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id?1020440
vdb-entry
x_refsource_SECTRACK
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.doxpara.com/DMK_BO2K8.ppt
x_refsource_MISC
x_transferred
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.debian.org/security/2008/dsa-1604
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/31823
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31326
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2558
vdb-entry
x_refsource_VUPEN
x_transferred
https://www.exploit-db.com/exploits/6122
exploit
x_refsource_EXPLOIT-DB
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2008/2383
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020560
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31900
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
x_refsource_CONFIRM
x_transferred
http://support.citrix.com/article/CTX118183
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30925
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2009/0311
vdb-entry
x_refsource_VUPEN
x_transferred
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2008/dsa-1623
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2008/2582
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
x_refsource_MISC
x_transferred
http://www.debian.org/security/2008/dsa-1605
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.novell.com/support/viewContent.do?externalId=7000912
x_refsource_CONFIRM
x_transferred
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2342
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2114/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/30973
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31204
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31354
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://security.gentoo.org/glsa/glsa-200812-17.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/33178
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30988
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/31011
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
x_refsource_MISC
x_transferred
http://www.vupen.com/english/advisories/2008/2334
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020577
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31422
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31197
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1020548
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2008/2467
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.us-cert.gov/cas/techalerts/TA08-190B.html
third-party-advisory
x_refsource_CERT
x_transferred
http://www.us-cert.gov/cas/techalerts/TA08-190A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://security.gentoo.org/glsa/glsa-200807-08.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/31022
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.securitytracker.com/id?1020449
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31093
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31052
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30980
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31199
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2030/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2291
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2023/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.vupen.com/english/advisories/2008/2466
vdb-entry
x_refsource_VUPEN
x_transferred
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
vendor-advisory
x_refsource_MS
x_transferred
http://secunia.com/advisories/31212
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2113/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31152
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2019/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2197/references
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020438
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/800113
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://secunia.com/advisories/31137
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31430
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31169
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020702
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2052/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020561
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020578
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020802
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securityfocus.com/bid/30131
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.openbsd.org/errata42.html#013_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://secunia.com/advisories/31236
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020651
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020437
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31209
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31012
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31151
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2050/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://support.citrix.com/article/CTX117991
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/31237
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/31495
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/6130
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020579
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.nominum.com/asset_upload_file741_2661.pdf
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020653
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/30998
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1603
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/31094
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://secunia.com/advisories/31687
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2025/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://secunia.com/advisories/31588
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31019
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2029/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/6123
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2268
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0297
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/31207
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31031
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2584
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31451
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2051/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/30977
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0789.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2377
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020558
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31221
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0533.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.openbsd.org/errata43.html#004_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020804
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31143
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/495289/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2195/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2196/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/33714
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=121866517322103&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/33786
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020448
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31882
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2384
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://up2date.astaro.com/2008/08/up2date_7202_released.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2123/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://support.apple.com/kb/HT3026
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31014
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30979
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020575
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2482
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://support.apple.com/kb/HT3129
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1619
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2166/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31072
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2139/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2092/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31482
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/30989
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2055/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=40
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31065
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31254
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.doxpara.com/?p=1176
Resource:
x_refsource_MISC
x_transferred
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-627-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/0622
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020576
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/31153
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2549
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31213
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31030
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-622-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/31033
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020440
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.doxpara.com/DMK_BO2K8.ppt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1604
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/31823
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31326
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/6122
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2383
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020560
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31900
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.citrix.com/article/CTX118183
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30925
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0311
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1623
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2582
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1605
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.novell.com/support/viewContent.do?externalId=7000912
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2342
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2114/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/30973
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31204
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31354
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/33178
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30988
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/31011
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2334
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020577
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31422
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31197
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020548
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2467
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190B.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200807-08.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/31022
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020449
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31093
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31052
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30980
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31199
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2030/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2291
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2023/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
Resource:
vendor-advisory
x_refsource_MS
x_transferred
Hyperlink: http://secunia.com/advisories/31212
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2113/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31152
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2019/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2197/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@microsoft.com
Published At:08 Jul, 2008 | 23:41
Updated At:24 Mar, 2020 | 18:19

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.8MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

Canonical Ltd.
canonical
>>ubuntu_linux>>6.06
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>7.04
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>7.10
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>8.04
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.0
cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>4.0
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_2000>>*
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
Microsoft Corporation
microsoft
>>windows_xp>>*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_xp>>-
cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
Microsoft Corporation
microsoft
>>windows_xp>>-
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>2.1
cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>2.1
cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>2.1
cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>5
cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>5
cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>5.0
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>4
cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>8
cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.9
cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-331Primarynvd@nist.gov
CWE ID: CWE-331
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2008-07-09T00:00:00

http://rhn.redhat.com/errata/RHSA-2008-0533.html

References
HyperlinkSourceResource
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.ascsecure@microsoft.com
Third Party Advisory
Vendor Advisory
http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.htmlsecure@microsoft.com
Technical Description
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401secure@microsoft.com
Third Party Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520secure@microsoft.com
Broken Link
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368secure@microsoft.com
Broken Link
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.htmlsecure@microsoft.com
Mailing List
Third Party Advisory
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.htmlsecure@microsoft.com
Mailing List
Third Party Advisory
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.htmlsecure@microsoft.com
Mailing List
Third Party Advisory
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.htmlsecure@microsoft.com
Mailing List
Third Party Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.htmlsecure@microsoft.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.htmlsecure@microsoft.com
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlsecure@microsoft.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=121630706004256&w=2secure@microsoft.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=121866517322103&w=2secure@microsoft.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=123324863916385&w=2secure@microsoft.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=141879471518471&w=2secure@microsoft.com
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2008-0533.htmlsecure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30925secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30973secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30977secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30979secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30980secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30988secure@microsoft.com
Third Party Advisory
Vendor Advisory
http://secunia.com/advisories/30989secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/30998secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31011secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31012secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31014secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31019secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31022secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31030secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31031secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31033secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31052secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31065secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31072secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31093secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31094secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31137secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31143secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31151secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31152secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31153secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31169secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31197secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31199secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31204secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31207secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31209secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31212secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31213secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31221secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31236secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31237secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31254secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31326secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31354secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31422secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31430secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31451secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31482secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31495secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31588secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31687secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31823secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31882secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31900secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/33178secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/33714secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/33786secure@microsoft.com
Third Party Advisory
http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.ascsecure@microsoft.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200807-08.xmlsecure@microsoft.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200812-17.xmlsecure@microsoft.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-201209-25.xmlsecure@microsoft.com
Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680secure@microsoft.com
Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239secure@microsoft.com
Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1secure@microsoft.com
Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1secure@microsoft.com
Third Party Advisory
http://support.apple.com/kb/HT3026secure@microsoft.com
Third Party Advisory
http://support.apple.com/kb/HT3129secure@microsoft.com
Third Party Advisory
http://support.citrix.com/article/CTX117991secure@microsoft.com
Third Party Advisory
http://support.citrix.com/article/CTX118183secure@microsoft.com
Third Party Advisory
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152secure@microsoft.com
Third Party Advisory
http://up2date.astaro.com/2008/08/up2date_7202_released.htmlsecure@microsoft.com
Third Party Advisory
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231secure@microsoft.com
Third Party Advisory
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018secure@microsoft.com
Third Party Advisory
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoningsecure@microsoft.com
Third Party Advisory
http://www.caughq.org/exploits/CAU-EX-2008-0002.txtsecure@microsoft.com
Third Party Advisory
http://www.caughq.org/exploits/CAU-EX-2008-0003.txtsecure@microsoft.com
Third Party Advisory
http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtmlsecure@microsoft.com
Third Party Advisory
http://www.debian.org/security/2008/dsa-1603secure@microsoft.com
Patch
http://www.debian.org/security/2008/dsa-1604secure@microsoft.com
Third Party Advisory
http://www.debian.org/security/2008/dsa-1605secure@microsoft.com
Third Party Advisory
http://www.debian.org/security/2008/dsa-1619secure@microsoft.com
Third Party Advisory
http://www.debian.org/security/2008/dsa-1623secure@microsoft.com
Third Party Advisory
http://www.doxpara.com/?p=1176secure@microsoft.com
Third Party Advisory
http://www.doxpara.com/DMK_BO2K8.pptsecure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26667secure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26668secure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26669secure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26670secure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26671secure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26672secure@microsoft.com
Third Party Advisory
http://www.ipcop.org/index.php?name=News&file=article&sid=40secure@microsoft.com
Third Party Advisory
http://www.isc.org/index.pl?/sw/bind/bind-security.phpsecure@microsoft.com
Third Party Advisory
http://www.kb.cert.org/vuls/id/800113secure@microsoft.com
Third Party Advisory
US Government Resource
http://www.kb.cert.org/vuls/id/MIMG-7DWR4Jsecure@microsoft.com
Third Party Advisory
US Government Resource
http://www.kb.cert.org/vuls/id/MIMG-7ECL8Qsecure@microsoft.com
Third Party Advisory
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:139secure@microsoft.com
Third Party Advisory
http://www.nominum.com/asset_upload_file741_2661.pdfsecure@microsoft.com
Third Party Advisory
http://www.novell.com/support/viewContent.do?externalId=7000912secure@microsoft.com
Third Party Advisory
http://www.openbsd.org/errata42.html#013_bindsecure@microsoft.com
Third Party Advisory
http://www.openbsd.org/errata43.html#004_bindsecure@microsoft.com
Third Party Advisory
http://www.phys.uu.nl/~rombouts/pdnsd.htmlsecure@microsoft.com
Third Party Advisory
http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLogsecure@microsoft.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0789.htmlsecure@microsoft.com
Third Party Advisory
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.htmlsecure@microsoft.com
Third Party Advisory
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/secure@microsoft.com
Third Party Advisory
http://www.securityfocus.com/archive/1/495289/100/0/threadedsecure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/495869/100/0/threadedsecure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/30131secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020437secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020438secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020440secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020448secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020449secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020548secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020558secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020560secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020561secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020575secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020576secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020577secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020578secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020579secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020651secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020653secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020702secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020802secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020804secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/usn-622-1secure@microsoft.com
Third Party Advisory
http://www.ubuntu.com/usn/usn-627-1secure@microsoft.com
Third Party Advisory
http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.htmlsecure@microsoft.com
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-190A.htmlsecure@microsoft.com
Third Party Advisory
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-190B.htmlsecure@microsoft.com
Third Party Advisory
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-260A.htmlsecure@microsoft.com
Third Party Advisory
US Government Resource
http://www.vmware.com/security/advisories/VMSA-2008-0014.htmlsecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2019/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2023/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2025/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2029/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2030/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2050/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2051/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2052/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2055/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2092/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2113/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2114/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2123/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2139/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2166/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2195/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2196/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2197/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2268secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2291secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2334secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2342secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2377secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2383secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2384secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2466secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2467secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2482secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2525secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2549secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2558secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2582secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2584secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2009/0297secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2009/0311secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2010/0622secure@microsoft.com
Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037secure@microsoft.com
Patch
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/43334secure@microsoft.com
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/43637secure@microsoft.com
Third Party Advisory
VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117secure@microsoft.com
Tool Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725secure@microsoft.com
Tool Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761secure@microsoft.com
Tool Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917secure@microsoft.com
Tool Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627secure@microsoft.com
Tool Signature
https://www.exploit-db.com/exploits/6122secure@microsoft.com
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/6123secure@microsoft.com
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/6130secure@microsoft.com
Third Party Advisory
VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.htmlsecure@microsoft.com
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.htmlsecure@microsoft.com
Third Party Advisory
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
Source: secure@microsoft.com
Resource:
Third Party Advisory
Vendor Advisory
Hyperlink: http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
Source: secure@microsoft.com
Resource:
Technical Description
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
Source: secure@microsoft.com
Resource:
Broken Link
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Source: secure@microsoft.com
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
Source: secure@microsoft.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Source: secure@microsoft.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Source: secure@microsoft.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Source: secure@microsoft.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Source: secure@microsoft.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=121866517322103&w=2
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0533.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30925
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30973
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30977
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30979
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30980
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30988
Source: secure@microsoft.com
Resource:
Third Party Advisory
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30989
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30998
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31011
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31012
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31014
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31019
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31022
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31030
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31031
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31033
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31052
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31065
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31072
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31093
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31094
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31137
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31143
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31151
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31152
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31153
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31169
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31197
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31199
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31204
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31207
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31209
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31212
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31213
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31221
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31236
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31237
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31254
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31326
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31354
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31422
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31430
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31451
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31482
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31495
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31588
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31687
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31823
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31882
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31900
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/33178
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/33714
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/33786
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200807-08.xml
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-17.xml
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT3026
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT3129
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://support.citrix.com/article/CTX117991
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://support.citrix.com/article/CTX118183
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://up2date.astaro.com/2008/08/up2date_7202_released.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2008/dsa-1603
Source: secure@microsoft.com
Resource:
Patch
Hyperlink: http://www.debian.org/security/2008/dsa-1604
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2008/dsa-1605
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2008/dsa-1619
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2008/dsa-1623
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.doxpara.com/?p=1176
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.doxpara.com/DMK_BO2K8.ppt
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=40
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/800113
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.nominum.com/asset_upload_file741_2661.pdf
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.novell.com/support/viewContent.do?externalId=7000912
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.openbsd.org/errata42.html#013_bind
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.openbsd.org/errata43.html#004_bind
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0789.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/archive/1/495289/100/0/threaded
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/30131
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020437
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020438
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020440
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020448
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020449
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020548
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020558
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020560
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020561
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020575
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020576
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020577
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020578
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020579
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020651
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020653
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020702
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020802
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020804
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.ubuntu.com/usn/usn-622-1
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ubuntu.com/usn/usn-627-1
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190A.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190B.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2019/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2023/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2025/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2029/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2030/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2050/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2051/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2052/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2055/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2092/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2113/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2114/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2123/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2139/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2166/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2195/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2196/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2197/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2268
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2291
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2334
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2342
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2377
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2383
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2384
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2467
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2482
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2549
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2582
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2584
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2009/0297
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2009/0311
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2010/0622
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
Source: secure@microsoft.com
Resource:
Patch
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
Source: secure@microsoft.com
Resource:
Tool Signature
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
Source: secure@microsoft.com
Resource:
Tool Signature
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
Source: secure@microsoft.com
Resource:
Tool Signature
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
Source: secure@microsoft.com
Resource:
Tool Signature
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
Source: secure@microsoft.com
Resource:
Tool Signature
Hyperlink: https://www.exploit-db.com/exploits/6122
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.exploit-db.com/exploits/6123
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.exploit-db.com/exploits/6130
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
Source: secure@microsoft.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

594Records found

CVE-2016-9956
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-1.89% / 83.20%
||
7 Day CHG~0.00%
Published-22 Feb, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The route manager in FlightGear before 2016.4.4 allows remote attackers to write to arbitrary files via a crafted Nasal script.

Action-Not Available
Vendor-flightgearn/aDebian GNU/LinuxFedora Project
Product-fedoradebian_linuxflightgearn/a
CWE ID-CWE-284
Improper Access Control
CVE-2019-12696
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.28% / 51.36%
||
7 Day CHG~0.00%
Published-02 Oct, 2019 | 19:06
Updated-19 Nov, 2024 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower System Software Detection Engine RTF and RAR Malware and File Policy Bypass Vulnerabilities

Multiple vulnerabilities in the Cisco Firepower System Software Detection Engine could allow an unauthenticated, remote attacker to bypass configured Malware and File Policies for RTF and RAR file types. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-isa_3000firepower_9300firepower_4150firepower_8000firepower_1010firepower_1140firepower_2120ftd_virtualfirepower_2130firepower_7000firepower_4110firepower_1120firepower_threat_defense_for_isrfirepower_2110firepower_4125ngipsv_for_vmwareasa_5500-xfirepower_4140firepower_2140firepowerfirepower_4145firepower_4120firepower_4115Cisco FireSIGHT System Software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2016-9902
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-7.5||HIGH
EPSS-0.41% / 61.43%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-25 Nov, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Pocket toolbar button, once activated, listens for events fired from it's own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled. This vulnerability affects Firefox ESR < 45.6 and Firefox < 50.1.

Action-Not Available
Vendor-Red Hat, Inc.Mozilla Corporation
Product-firefoxenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_serverenterprise_linux_workstationenterprise_linux_server_ausFirefoxFirefox ESR
CWE ID-CWE-346
Origin Validation Error
CVE-2019-12632
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.56% / 68.49%
||
7 Day CHG~0.00%
Published-05 Sep, 2019 | 01:15
Updated-19 Nov, 2024 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Finesse Request Processing Server-Side Request Forgery Vulnerability

A vulnerability in Cisco Finesse could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on an affected system. The vulnerability exists because the affected system does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to access the system and perform unauthorized actions.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-finesseCisco Finesse
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2019-12620
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 46.25%
||
7 Day CHG~0.00%
Published-18 Sep, 2019 | 16:15
Updated-19 Nov, 2024 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco HyperFlex Software Counter Value Injection Vulnerability

A vulnerability in the statistics collection service of Cisco HyperFlex Software could allow an unauthenticated, remote attacker to inject arbitrary values on an affected device. The vulnerability is due to insufficient authentication for the statistics collection service. An attacker could exploit this vulnerability by sending properly formatted data values to the statistics collection service of an affected device. A successful exploit could allow the attacker to cause the web interface statistics view to present invalid data to users.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-hyperflex_hx240c_af_m5hyperflex_hx240c_m5hyperflex_hx220c_m5hyperflex_hx240c_m5_firmwarehyperflex_hx220c_edge_m5hyperflex_hx220c_m5_firmwarehyperflex_hx220c_af_m5_firmwarehyperflex_hx240c_af_m5_firmwarehyperflex_hx220c_edge_m5_firmwarehyperflex_hx220c_af_m5Cisco HyperFlex HX-Series
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2019-1265
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-5.03% / 89.77%
||
7 Day CHG~0.00%
Published-11 Sep, 2019 | 21:24
Updated-04 Aug, 2024 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security feature bypass vulnerability exists when Microsoft Yammer App for Android fails to apply the correct Intune MAM Policy.This could allow an attacker to perform functions that are restricted by Intune Policy.The security update addresses the vulnerability by correcting the way the policy is applied to Yammer App., aka 'Microsoft Yammer Security Feature Bypass Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-yammerYammer for Android
CVE-2017-0256
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-5.3||MEDIUM
EPSS-4.35% / 88.96%
||
7 Day CHG~0.00%
Published-12 May, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.

Action-Not Available
Vendor-Microsoft Corporation
Product-microsoft.aspnetcore.mvc.apiexplorermicrosoft.aspnetcore.mvc.dataannotationsmicrosoft.aspnetcore.mvc.formatters.jsonsystem.net.securitymicrosoft.aspnetcore.mvc.razormicrosoft.aspnetcore.mvc.formatters.xmlmicrosoft.aspnetcore.mvc.corsmicrosoft.aspnetcore.mvc.localizationmicrosoft.aspnetcore.mvc.viewfeaturesmicrosoft.aspnetcore.mvc.webapicompatshimmicrosoft.aspnetcore.mvc.abstractionssystem.net.http.winhttphandlersystem.net.httpasp.net_model_view_controllersystem.text.encodings.websystem.net.websockets.clientmicrosoft.aspnetcore.mvc.razor.hostmicrosoft.aspnetcore.mvc.taghelpersASP.NET Core
CWE ID-CWE-20
Improper Input Validation
CVE-2017-0247
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-11.12% / 93.49%
||
7 Day CHG~0.00%
Published-12 May, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.

Action-Not Available
Vendor-Microsoft Corporation
Product-microsoft.aspnetcore.mvc.apiexplorermicrosoft.aspnetcore.mvc.dataannotationsmicrosoft.aspnetcore.mvc.formatters.jsonsystem.net.securitymicrosoft.aspnetcore.mvc.razormicrosoft.aspnetcore.mvc.formatters.xmlmicrosoft.aspnetcore.mvc.corsmicrosoft.aspnetcore.mvc.localizationmicrosoft.aspnetcore.mvc.viewfeaturesmicrosoft.aspnetcore.mvc.webapicompatshimmicrosoft.aspnetcore.mvc.abstractionssystem.net.http.winhttphandlersystem.net.httpasp.net_model_view_controllersystem.text.encodings.websystem.net.websockets.clientmicrosoft.aspnetcore.mvc.razor.hostmicrosoft.aspnetcore.mvc.taghelpersASP.NET Core
CWE ID-CWE-20
Improper Input Validation
CVE-2019-12467
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.30% / 53.24%
||
7 Day CHG~0.00%
Published-10 Jul, 2019 | 14:45
Updated-04 Aug, 2024 | 23:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MediaWiki through 1.32.1 has Incorrect Access Control (issue 1 of 3). A spammer can use Special:ChangeEmail to send out spam with no rate limiting or ability to block them. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.

Action-Not Available
Vendor-n/aDebian GNU/LinuxWikimedia Foundation
Product-debian_linuxmediawikin/a
CVE-2017-0248
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-1.09% / 77.99%
||
7 Day CHG~0.00%
Published-12 May, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability."

Action-Not Available
Vendor-Microsoft Corporation
Product-.net_frameworkMicrosoft .NET Framework
CWE ID-CWE-295
Improper Certificate Validation
CVE-2019-11324
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.31% / 79.87%
||
7 Day CHG~0.00%
Published-18 Apr, 2019 | 00:00
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.

Action-Not Available
Vendor-n/aCanonical Ltd.Python Software Foundation
Product-ubuntu_linuxurllib3n/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-32565
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-5.67% / 90.41%
||
7 Day CHG~0.00%
Published-29 Jun, 2021 | 11:45
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HTTP Request Smuggling, content length with invalid charters

Invalid values in the Content-Length header sent to Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.

Action-Not Available
Vendor-The Apache Software FoundationDebian GNU/Linux
Product-debian_linuxtraffic_serverApache Traffic Server
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2019-11717
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-5.3||MEDIUM
EPSS-4.69% / 89.36%
||
7 Day CHG~0.00%
Published-23 Jul, 2019 | 13:18
Updated-25 Nov, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.

Action-Not Available
Vendor-NovellMozilla CorporationopenSUSEDebian GNU/Linux
Product-thunderbirdsuse_package_hub_for_suse_linux_enterprisefirefoxleapdebian_linuxFirefoxFirefox ESRThunderbird
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CVE-2016-8743
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-8.41% / 92.34%
||
7 Day CHG~0.00%
Published-27 Jul, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.The Apache Software FoundationNetApp, Inc.
Product-oncommand_unified_managerenterprise_linux_desktopenterprise_linux_server_ausenterprise_linux_server_tusjboss_core_servicesenterprise_linux_eusclustered_data_ontapenterprise_linux_workstationenterprise_linuxdebian_linuxenterprise_linux_serverhttp_serverApache HTTP Server
CVE-2019-10172
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.56% / 68.40%
||
7 Day CHG~0.00%
Published-18 Nov, 2019 | 16:16
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.

Action-Not Available
Vendor-Red Hat, Inc.FasterXML, LLC.The Apache Software FoundationDebian GNU/Linux
Product-sparkdebian_linuxjackson-mapper-asljboss_fusejboss_enterprise_application_platformjackson-mapper-asl
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CVE-2019-1006
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-2.93% / 86.44%
||
7 Day CHG~0.00%
Published-15 Jul, 2019 | 18:56
Updated-04 Aug, 2024 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability exists in Windows Communication Foundation (WCF) and Windows Identity Foundation (WIF), allowing signing of SAML tokens with arbitrary symmetric keys, aka 'WCF/WIF SAML Token Authentication Bypass Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016sharepoint_foundationwindows_server_2012windows_8.1windows_rt_8.1identitymodelwindows_7sharepoint_serversharepoint_enterprise_serverwindows_10.net_frameworkwindows_server_2019windows_server_2008WindowsMicrosoft .NET Framework 4.8 on Windows Server 2012 R2Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit SystemsMicrosoft .NET Framework 4.8 on Windows 10 Version 1709 for x64-based SystemsMicrosoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based SystemsMicrosoft .NET Framework 4.8 on Windows 10 Version 1803 for x64-based SystemsMicrosoft .NET Framework 4.6Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit SystemsMicrosoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1903 for x64-based SystemsWindows 10 Version 1903 for ARM64-based SystemsMicrosoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsMicrosoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Microsoft .NET Framework 2.0Microsoft .NET Framework 4.8 on Windows 8.1 for 32-bit systemsMicrosoft .NET Framework 4.8 on Windows 10 Version 1703 for x64-based SystemsMicrosoft .NET Framework 4.8 on Windows 10 Version 1803 for 32-bit SystemsMicrosoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation)Microsoft.IdentityModelMicrosoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2Microsoft .NET Framework 4.8 on Windows Server 2012Microsoft .NET Framework 3.5 AND 4.8 on Windows Server, version 1903 (Server Core installation)Windows ServerMicrosoft .NET Framework 4.8 on Windows 7 for x64-based Systems Service Pack 1Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation)Microsoft SharePoint Enterprise ServerMicrosoft .NET Framework 4.8 on Windows RT 8.1Microsoft SharePoint ServerMicrosoft .NET Framework 4.6/4.6.1/4.6.2Microsoft .NET Framework 3.0Microsoft .NET Framework 4.8 on Windows Server 2016Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based SystemsMicrosoft .NET Framework 4.8 on Windows 8.1 for x64-based systemsMicrosoft .NET Framework 4.5.2Microsoft .NET Framework 4.8 on Windows 10 Version 1709 for 32-bit SystemsMicrosoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation)Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit SystemsMicrosoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1903 for x64-based SystemsMicrosoft .NET Framework 4.8 on Windows 7 for 32-bit Systems Service Pack 1Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019Microsoft SharePoint FoundationMicrosoft .NET Framework 3.5Microsoft .NET Framework 3.5.1Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based SystemsMicrosoft .NET Framework 4.8 on Windows Server, version 1803 (Server Core Installation)Windows Server, version 1903 (Server Core installation)Microsoft .NET Framework 4.8 on Windows 10 Version 1703 for 32-bit SystemsMicrosoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-295
Improper Certificate Validation
CVE-2019-0875
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-1.90% / 83.27%
||
7 Day CHG~0.00%
Published-09 Apr, 2019 | 20:20
Updated-04 Aug, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability exists when Azure DevOps Server 2019 does not properly enforce project permissions, aka 'Azure DevOps Server Elevation of Privilege Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-azure_devops_serverAzure DevOps Server
CVE-2019-0637
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-11.65% / 93.68%
||
7 Day CHG~0.00%
Published-06 Mar, 2019 | 00:00
Updated-04 Aug, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security feature bypass vulnerability exists when Windows Defender Firewall incorrectly applies firewall profiles to cellular network connections, aka 'Windows Defender Firewall Security Feature Bypass Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2019windows_10WindowsWindows Server
CVE-2018-8779
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.28% / 79.63%
||
7 Day CHG~0.00%
Published-03 Apr, 2018 | 22:00
Updated-05 Aug, 2024 | 07:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Ruby
Product-ubuntu_linuxdebian_linuxrubyn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-8310
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-13.40% / 94.21%
||
7 Day CHG+0.10%
Published-11 Jul, 2018 | 00:00
Updated-05 Aug, 2024 | 06:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A tampering vulnerability exists when Microsoft Outlook does not properly handle specific attachment types when rendering HTML emails, aka "Microsoft Office Tampering Vulnerability." This affects Microsoft Word, Microsoft Office.

Action-Not Available
Vendor-Microsoft Corporation
Product-wordofficeMicrosoft WordMicrosoft Office
CVE-2018-8474
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-24.44% / 96.12%
||
7 Day CHG~0.00%
Published-13 Sep, 2018 | 00:00
Updated-05 Aug, 2024 | 06:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security feature bypass vulnerability exists when Lync for Mac 2011 fails to properly sanitize specially crafted messages, aka "Lync for Mac 2011 Security Feature Bypass Vulnerability." This affects Microsoft Lync.

Action-Not Available
Vendor-Microsoft Corporation
Product-lync_for_macMicrosoft Lync
CWE ID-CWE-20
Improper Input Validation
CVE-2016-8614
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.08% / 23.42%
||
7 Day CHG~0.00%
Published-31 Jul, 2018 | 21:00
Updated-06 Aug, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.

Action-Not Available
Vendor-Red Hat, Inc.
Product-ansibleAnsible
CWE ID-CWE-358
Improperly Implemented Security Check for Standard
CWE ID-CWE-320
Not Available
CVE-2016-9415
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.00% / 77.04%
||
7 Day CHG~0.00%
Published-31 Jan, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MyBB (aka MyBulletinBoard) before 1.8.8 on Windows and MyBB Merge System before 1.8.8 on Windows allow remote attackers to overwrite arbitrary CSS files via vectors related to "style import."

Action-Not Available
Vendor-n/aMyBBMicrosoft Corporation
Product-merge_systemmybbwindowsn/a
CWE ID-CWE-284
Improper Access Control
CVE-2016-9193
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.38% / 59.68%
||
7 Day CHG~0.00%
Published-14 Dec, 2016 | 00:37
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the malicious file detection and blocking features of Cisco Firepower Management Center and Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system. Affected Products: Cisco Firepower Management Center and FireSIGHT System Software are affected when they are configured to use a file policy that has the Block Malware action. More Information: CSCvb27494. Known Affected Releases: 6.0.1.1 6.1.0.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firesight_system_softwaresecure_firewall_management_centerCisco FireSIGHT
CWE ID-CWE-20
Improper Input Validation
CVE-2021-27195
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.25% / 47.95%
||
7 Day CHG~0.00%
Published-25 Mar, 2021 | 18:30
Updated-03 Aug, 2024 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Authorization vulnerability in Netop Vision Pro up to and including to 9.7.1 allows an attacker to replay network traffic.

Action-Not Available
Vendor-netopn/aMicrosoft Corporation
Product-vision_prowindowsn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2016-6796
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.84% / 74.74%
||
7 Day CHG~0.00%
Published-11 Aug, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.

Action-Not Available
Vendor-Debian GNU/LinuxCanonical Ltd.Red Hat, Inc.The Apache Software FoundationOracle CorporationNetApp, Inc.
Product-enterprise_linux_desktoptekelec_platform_distributionenterprise_linux_server_tusenterprise_linux_eusenterprise_linux_workstationjboss_enterprise_application_platformtomcatoncommand_shiftdebian_linuxsnap_creator_frameworkenterprise_linux_serverubuntu_linuxenterprise_linux_server_ausjboss_enterprise_web_serveroncommand_insightApache Tomcat
CVE-2008-1902
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.24% / 47.60%
||
7 Day CHG~0.00%
Published-21 Apr, 2008 | 22:10
Updated-07 Aug, 2024 | 08:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The GUI for aptlinex before 0.91 does not sufficiently warn the user of potentially dangerous actions, which allows remote attackers to remove or modify packages via an apt:// URL.

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-aptlinexn/a
CVE-2016-7162
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.15% / 78.52%
||
7 Day CHG~0.00%
Published-26 Sep, 2016 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive.

Action-Not Available
Vendor-file_roller_projectn/aCanonical Ltd.
Product-ubuntu_linuxfile_rollern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-11565
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.06%
||
7 Day CHG~0.00%
Published-23 Jul, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

debian/tor.init in the Debian tor_0.2.9.11-1~deb9u1 package for Tor was designed to execute aa-exec from the standard system pathname if the apparmor package is installed, but implements this incorrectly (with a wrong assumption that the specific pathname would remain the same forever), which allows attackers to bypass intended AppArmor restrictions by leveraging the silent loss of this protection mechanism. NOTE: this does not affect systems, such as default Debian stretch installations, on which Tor startup relies on a systemd unit file (instead of this tor.init script).

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-torn/a
CVE-2021-25634
Matching Score-8
Assigner-Document Foundation, The
ShareView Details
Matching Score-8
Assigner-Document Foundation, The
CVSS Score-7.5||HIGH
EPSS-0.41% / 61.12%
||
7 Day CHG~0.00%
Published-12 Oct, 2021 | 13:33
Updated-17 Sep, 2024 | 00:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timestamp Manipulation with Signature Wrapping

LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to modify a digitally signed ODF document to insert an additional signing time timestamp which LibreOffice would incorrectly present as a valid signature signed at the bogus signing time. This issue affects: The Document Foundation LibreOffice 7-0 versions prior to 7.0.6; 7-1 versions prior to 7.1.2.

Action-Not Available
Vendor-libreofficeThe Document FoundationDebian GNU/Linux
Product-debian_linuxlibreofficeLibreOffice
CWE ID-CWE-295
Improper Certificate Validation
CVE-2016-7401
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.38% / 88.99%
||
7 Day CHG~0.00%
Published-03 Oct, 2016 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.

Action-Not Available
Vendor-n/aCanonical Ltd.DjangoDebian GNU/Linux
Product-debian_linuxubuntu_linuxdjangon/a
CVE-2019-16236
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.81% / 74.32%
||
7 Day CHG~0.00%
Published-11 Sep, 2019 | 18:57
Updated-05 Aug, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dino before 2019-09-10 does not check roster push authorization in module/roster/module.vala.

Action-Not Available
Vendor-dinon/aCanonical Ltd.Fedora ProjectDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxfedoradinon/a
CWE ID-CWE-862
Missing Authorization
CVE-2021-25633
Matching Score-8
Assigner-Document Foundation, The
ShareView Details
Matching Score-8
Assigner-Document Foundation, The
CVSS Score-7.5||HIGH
EPSS-0.53% / 67.18%
||
7 Day CHG~0.00%
Published-11 Oct, 2021 | 16:43
Updated-16 Sep, 2024 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Content Manipulation with Double Certificate Attack

LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to combine multiple certificate data, which when opened caused LibreOffice to display a validly signed indicator but whose content was unrelated to the signature shown. This issue affects: The Document Foundation LibreOffice 7-0 versions prior to 7.0.6; 7-1 versions prior to 7.1.2.

Action-Not Available
Vendor-libreofficeThe Document FoundationDebian GNU/Linux
Product-debian_linuxlibreofficeLibreOffice
CWE ID-CWE-295
Improper Certificate Validation
CVE-2016-7247
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-24.93% / 96.17%
||
7 Day CHG~0.00%
Published-10 Nov, 2016 | 06:16
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow physically proximate attackers to bypass the Secure Boot protection mechanism via a crafted boot policy, aka "Secure Boot Component Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_server_2016windows_rt_8.1windows_server_2012windows_8.1windows_10n/a
CWE ID-CWE-284
Improper Access Control
CVE-2021-26613
Matching Score-8
Assigner-KrCERT/CC
ShareView Details
Matching Score-8
Assigner-KrCERT/CC
CVSS Score-8.1||HIGH
EPSS-0.31% / 53.93%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:05
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
tobesoft nexacro arbitrary file creation vulnerability

improper input validation vulnerability in nexacro permits copying file to the startup folder using rename method.

Action-Not Available
Vendor-tobesofttobesoft co., ltdMicrosoft Corporation
Product-windowsnexacroNexacro 17
CWE ID-CWE-20
Improper Input Validation
CVE-2016-6460
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.48%
||
7 Day CHG~0.00%
Published-19 Nov, 2016 | 02:45
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the FTP Representational State Transfer Application Programming Interface (REST API) for Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass FTP malware detection rules and download malware over an FTP connection. Cisco Firepower System Software is affected when the device has a file policy with malware block configured for FTP connections. More Information: CSCuv36188 CSCuy91156. Known Affected Releases: 5.4.0.2 5.4.1.1 5.4.1.6 6.0.0 6.1.0 6.2.0. Known Fixed Releases: 6.0.0.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firesight_system_softwareCisco Firepower System Software 5.4.0.2 through 6.2.0
CVE-2016-6458
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.21% / 44.03%
||
7 Day CHG~0.00%
Published-19 Nov, 2016 | 02:45
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass content filters configured on an affected device. Email that should have been filtered could instead be forwarded by the device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to use a content filter for email attachments that are protected or encrypted. More Information: CSCva52546. Known Affected Releases: 10.0.0-125 9.7.1-066.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-email_security_appliance_firmwareCisco AsyncOS 10.0.0-125 and 9.7.1-066
CWE ID-CWE-20
Improper Input Validation
CVE-2021-26117
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-9.94% / 93.04%
||
7 Day CHG~0.00%
Published-27 Jan, 2021 | 00:00
Updated-03 Aug, 2024 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ActiveMQ: LDAP-Authentication does not verify passwords on servers with anonymous bind

The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password.

Action-Not Available
Vendor-The Apache Software FoundationNetApp, Inc.Debian GNU/LinuxOracle Corporation
Product-debian_linuxactivemq_artemiscommunications_session_route_manageractivemqflexcube_private_bankingoncommand_workflow_automationcommunications_session_report_managercommunications_element_managerApache ActiveMQ
CWE ID-CWE-287
Improper Authentication
CVE-2016-6371
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-7.29% / 91.68%
||
7 Day CHG~0.00%
Published-12 Sep, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in the web interface in Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) 10.6(3) and earlier allows remote attackers to write to arbitrary files via a crafted URL, aka Bug ID CSCuz64717.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-hosted_collaboration_mediation_fulfillmentn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-8171
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-21.80% / 95.77%
||
7 Day CHG-2.53%
Published-11 Jul, 2018 | 00:00
Updated-05 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated, aka "ASP.NET Security Feature Bypass Vulnerability." This affects ASP.NET, ASP.NET Core 1.1, ASP.NET Core 1.0, ASP.NET Core 2.0, ASP.NET MVC 5.2.

Action-Not Available
Vendor-Microsoft Corporation
Product-asp.net_webpagesasp.net_model_view_controllerasp.net_coreASP.NETASP.NET CoreASP.NET MVC 5.2
CWE ID-CWE-287
Improper Authentication
CVE-2021-22939
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-5.3||MEDIUM
EPSS-0.12% / 31.63%
||
7 Day CHG~0.00%
Published-16 Aug, 2021 | 00:00
Updated-30 Apr, 2025 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

Action-Not Available
Vendor-Node.js (OpenJS Foundation)Oracle CorporationNetApp, Inc.Siemens AGDebian GNU/Linux
Product-sinec_infrastructure_network_servicespeoplesoft_enterprise_peopletoolsdebian_linuxgraalvmmysql_clusternextgen_apijd_edwards_enterpriseone_toolsnode.jsNode
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-22940
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.39% / 59.84%
||
7 Day CHG~0.00%
Published-16 Aug, 2021 | 00:00
Updated-30 Apr, 2025 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.

Action-Not Available
Vendor-Node.js (OpenJS Foundation)Oracle CorporationNetApp, Inc.Siemens AGDebian GNU/Linux
Product-sinec_infrastructure_network_servicespeoplesoft_enterprise_peopletoolsdebian_linuxgraalvmnextgen_apijd_edwards_enterpriseone_toolsnode.jsNode
CWE ID-CWE-416
Use After Free
CVE-2003-1566
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-9.30% / 92.76%
||
7 Day CHG~0.00%
Published-15 Jan, 2009 | 00:00
Updated-08 Aug, 2024 | 02:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Internet Information Services (IIS) 5.0 does not log requests that use the TRACK method, which allows remote attackers to obtain sensitive information without detection.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-internet_information_servicesn/a
CWE ID-CWE-16
Not Available
CVE-2016-5420
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-1.09% / 77.94%
||
7 Day CHG~0.00%
Published-10 Aug, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.

Action-Not Available
Vendor-n/aDebian GNU/LinuxopenSUSECURL
Product-debian_linuxleaplibcurln/a
CWE ID-CWE-285
Improper Authorization
CVE-2016-6255
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-54.09% / 98.02%
||
7 Day CHG~0.00%
Published-07 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler.

Action-Not Available
Vendor-libupnp_projectn/aDebian GNU/Linux
Product-debian_linuxlibupnpn/a
CWE ID-CWE-284
Improper Access Control
CVE-2016-5418
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-5.22% / 89.97%
||
7 Day CHG~0.00%
Published-21 Sep, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.

Action-Not Available
Vendor-n/aOracle CorporationlibarchiveRed Hat, Inc.
Product-enterprise_linux_serverenterprise_linux_server_ausenterprise_linux_hpc_nodelibarchiveenterprise_linux_desktopenterprise_linux_server_eusopenshiftenterprise_linux_workstationenterprise_linux_hpc_node_euslinuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-6794
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-37.43% / 97.19%
||
7 Day CHG~0.00%
Published-07 Feb, 2018 | 05:00
Updated-05 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.

Action-Not Available
Vendor-suricata-idsn/aDebian GNU/Linux
Product-debian_linuxsuricatan/a
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2021-21343
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.62% / 70.19%
||
7 Day CHG~0.00%
Published-22 Mar, 2021 | 23:40
Updated-23 May, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.

Action-Not Available
Vendor-xstreamx-streamNetApp, Inc.Oracle CorporationFedora ProjectThe Apache Software FoundationDebian GNU/Linux
Product-xstreambanking_virtual_account_managementjmetercommunications_unified_inventory_managementcommunications_policy_managementcommunications_billing_and_revenue_management_elastic_charging_enginewebcenter_portalactivemqretail_xstore_point_of_serviceoncommand_insightdebian_linuxbanking_enterprise_default_managementfedorabanking_platformbusiness_activity_monitoringxstream
CWE ID-CWE-502
Deserialization of Untrusted Data
CWE ID-CWE-73
External Control of File Name or Path
CVE-2016-6396
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.43% / 62.77%
||
7 Day CHG~0.00%
Published-12 Sep, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Firepower Management Center before 6.1 and FireSIGHT System Software before 6.1, when certain malware blocking options are enabled, allow remote attackers to bypass malware detection via crafted fields in HTTP headers, aka Bug ID CSCuz44482.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firesight_system_softwaren/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-6914
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.37% / 84.98%
||
7 Day CHG~0.00%
Published-03 Apr, 2018 | 22:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.RubyRed Hat, Inc.
Product-ubuntu_linuxdebian_linuxrubyenterprise_linuxn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 11
  • 12
  • Next
Details not found