Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-5684

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-19 Dec, 2008 | 17:00
Updated At-07 Aug, 2024 | 11:04
Rejected At-
Credits

Unspecified vulnerability in the X Inter Client Exchange library (aka libICE) in Sun Solaris 8 through 10 and OpenSolaris before snv_85 allows context-dependent attackers to cause a denial of service (application crash), as demonstrated by a port scan that triggers a segmentation violation in the Gnome session manager (aka gnome-session).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:19 Dec, 2008 | 17:00
Updated At:07 Aug, 2024 | 11:04
Rejected At:
▼CVE Numbering Authority (CNA)

Unspecified vulnerability in the X Inter Client Exchange library (aka libICE) in Sun Solaris 8 through 10 and OpenSolaris before snv_85 allows context-dependent attackers to cause a denial of service (application crash), as demonstrated by a port scan that triggers a segmentation violation in the Gnome session manager (aka gnome-session).

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://support.avaya.com/elmodocs2/security/ASA-2008-513.htm
x_refsource_MISC
http://sunsolve.sun.com/search/document.do?assetkey=1-21-119067-11-1
x_refsource_CONFIRM
http://securitytracker.com/id?1021391
vdb-entry
x_refsource_SECTRACK
http://sunsolve.sun.com/search/document.do?assetkey=1-26-243566-1
vendor-advisory
x_refsource_SUNALERT
https://exchange.xforce.ibmcloud.com/vulnerabilities/47311
vdb-entry
x_refsource_XF
http://secunia.com/advisories/33157
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/3431
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/bid/32807
vdb-entry
x_refsource_BID
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6003
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/33325
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-513.htm
Resource:
x_refsource_MISC
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-21-119067-11-1
Resource:
x_refsource_CONFIRM
Hyperlink: http://securitytracker.com/id?1021391
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-243566-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/47311
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/33157
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/3431
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/bid/32807
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6003
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/33325
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://support.avaya.com/elmodocs2/security/ASA-2008-513.htm
x_refsource_MISC
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-21-119067-11-1
x_refsource_CONFIRM
x_transferred
http://securitytracker.com/id?1021391
vdb-entry
x_refsource_SECTRACK
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-243566-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/47311
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/33157
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/3431
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/bid/32807
vdb-entry
x_refsource_BID
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6003
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/33325
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-513.htm
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-21-119067-11-1
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://securitytracker.com/id?1021391
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-243566-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/47311
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/33157
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/3431
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/32807
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6003
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/33325
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:19 Dec, 2008 | 17:30
Updated At:29 Sep, 2017 | 01:32

Unspecified vulnerability in the X Inter Client Exchange library (aka libICE) in Sun Solaris 8 through 10 and OpenSolaris before snv_85 allows context-dependent attackers to cause a denial of service (application crash), as demonstrated by a port scan that triggers a segmentation violation in the Gnome session manager (aka gnome-session).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>Versions up to snv_84(inclusive)
cpe:2.3:o:sun:opensolaris:*:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_01
cpe:2.3:o:sun:opensolaris:snv_01:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_02
cpe:2.3:o:sun:opensolaris:snv_02:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_03
cpe:2.3:o:sun:opensolaris:snv_03:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_04
cpe:2.3:o:sun:opensolaris:snv_04:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_05
cpe:2.3:o:sun:opensolaris:snv_05:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_06
cpe:2.3:o:sun:opensolaris:snv_06:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_07
cpe:2.3:o:sun:opensolaris:snv_07:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_08
cpe:2.3:o:sun:opensolaris:snv_08:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_09
cpe:2.3:o:sun:opensolaris:snv_09:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_10
cpe:2.3:o:sun:opensolaris:snv_10:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_11
cpe:2.3:o:sun:opensolaris:snv_11:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_12
cpe:2.3:o:sun:opensolaris:snv_12:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_13
cpe:2.3:o:sun:opensolaris:snv_13:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_14
cpe:2.3:o:sun:opensolaris:snv_14:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_15
cpe:2.3:o:sun:opensolaris:snv_15:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_16
cpe:2.3:o:sun:opensolaris:snv_16:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_17
cpe:2.3:o:sun:opensolaris:snv_17:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_18
cpe:2.3:o:sun:opensolaris:snv_18:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_19
cpe:2.3:o:sun:opensolaris:snv_19:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_20
cpe:2.3:o:sun:opensolaris:snv_20:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_21
cpe:2.3:o:sun:opensolaris:snv_21:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_22
cpe:2.3:o:sun:opensolaris:snv_22:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_23
cpe:2.3:o:sun:opensolaris:snv_23:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_24
cpe:2.3:o:sun:opensolaris:snv_24:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_25
cpe:2.3:o:sun:opensolaris:snv_25:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_26
cpe:2.3:o:sun:opensolaris:snv_26:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_27
cpe:2.3:o:sun:opensolaris:snv_27:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_28
cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_29
cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_30
cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_31
cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_32
cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_33
cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_34
cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_35
cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_36
cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_37
cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_38
cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_39
cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_40
cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_41
cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_42
cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_43
cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_44
cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_45
cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_46
cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_47
cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_48
cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_49
cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-399Primarynvd@nist.gov
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: CWE-399
Type: Primary
Source: nvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/33157cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/33325cve@mitre.org
N/A
http://securitytracker.com/id?1021391cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-21-119067-11-1cve@mitre.org
Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-243566-1cve@mitre.org
Patch
Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-513.htmcve@mitre.org
N/A
http://www.securityfocus.com/bid/32807cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/3431cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/47311cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6003cve@mitre.org
N/A
Hyperlink: http://secunia.com/advisories/33157
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/33325
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1021391
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-21-119067-11-1
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-243566-1
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-513.htm
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/32807
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/3431
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/47311
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6003
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

332Records found

CVE-2008-4409
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-11.30% / 93.27%
||
7 Day CHG~0.00%
Published-03 Oct, 2008 | 17:18
Updated-07 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.

Action-Not Available
Vendor-n/alibxml2 (XMLSoft)
Product-libxml2n/a
CWE ID-CWE-399
Not Available
CVE-2008-4551
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.24% / 78.41%
||
7 Day CHG~0.00%
Published-14 Oct, 2008 | 19:00
Updated-07 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

strongSwan 4.2.6 and earlier allows remote attackers to cause a denial of service (daemon crash) via an IKE_SA_INIT message with a large number of NULL values in a Key Exchange payload, which triggers a NULL pointer dereference for the return value of the mpz_export function in the GNU Multiprecision Library (GMP).

Action-Not Available
Vendor-strongswann/a
Product-strongswann/a
CWE ID-CWE-399
Not Available
CVE-2009-1379
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-10.23% / 92.85%
||
7 Day CHG~0.00%
Published-19 May, 2009 | 19:00
Updated-07 Aug, 2024 | 05:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-399
Not Available
CVE-2009-1632
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.31% / 88.44%
||
7 Day CHG~0.00%
Published-14 May, 2009 | 17:00
Updated-07 Aug, 2024 | 05:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c.

Action-Not Available
Vendor-ipsec-toolsn/a
Product-ipsec-toolsn/a
CWE ID-CWE-399
Not Available
CVE-2008-4324
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-8.81% / 92.19%
||
7 Day CHG~0.00%
Published-29 Sep, 2008 | 20:00
Updated-07 Aug, 2024 | 10:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The user interface event dispatcher in Mozilla Firefox 3.0.3 on Windows XP SP2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a series of keypress, click, onkeydown, onkeyup, onmousedown, and onmouseup events. NOTE: it was later reported that Firefox 3.0.2 on Mac OS X 10.5 is also affected.

Action-Not Available
Vendor-n/aMozilla CorporationMicrosoft Corporation
Product-firefoxwindows_xpn/a
CWE ID-CWE-399
Not Available
CVE-2008-5035
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.83% / 82.16%
||
7 Day CHG~0.00%
Published-10 Nov, 2008 | 16:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Resource Monitoring and Control (RMC) daemon in IBM Hardware Management Console (HMC) 7 release 3.2.0 SP1 and 3.3.0 SP2 allows remote attackers to cause a denial of service (daemon crash or hang) via a packet with an invalid length.

Action-Not Available
Vendor-n/aIBM Corporation
Product-hardware_management_consolen/a
CWE ID-CWE-399
Not Available
CVE-2008-5016
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-21.25% / 95.47%
||
7 Day CHG~0.00%
Published-13 Nov, 2008 | 11:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The layout engine in Mozilla Firefox 3.x before 3.0.4, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via multiple vectors that trigger an assertion failure or other consequences.

Action-Not Available
Vendor-n/aMozilla Corporation
Product-firefoxthunderbirdseamonkeyn/a
CWE ID-CWE-399
Not Available
CVE-2008-4382
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.47% / 63.78%
||
7 Day CHG~0.00%
Published-02 Oct, 2008 | 18:00
Updated-07 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Konqueror in KDE 3.5.9 allows remote attackers to cause a denial of service (application crash) via Javascript that calls the alert function with a URL-encoded string of a large number of invalid characters.

Action-Not Available
Vendor-n/aKDE
Product-konquerorn/a
CWE ID-CWE-399
Not Available
CVE-2008-4610
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.64% / 87.38%
||
7 Day CHG~0.00%
Published-20 Oct, 2008 | 17:00
Updated-07 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MPlayer allows remote attackers to cause a denial of service (application crash) via (1) a malformed AAC file, as demonstrated by lol-vlc.aac; or (2) a malformed Ogg Media (OGM) file, as demonstrated by lol-ffplay.ogm, different vectors than CVE-2007-6718.

Action-Not Available
Vendor-mplayern/a
Product-mplayern/a
CWE ID-CWE-399
Not Available
CVE-2008-4194
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-8.82% / 92.20%
||
7 Day CHG~0.00%
Published-24 Sep, 2008 | 10:00
Updated-07 Aug, 2024 | 10:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The p_exec_query function in src/dns_query.c in pdnsd before 1.2.7-par allows remote attackers to cause a denial of service (daemon crash) via a long DNS reply with many entries in the answer section, related to a "dangling pointer bug."

Action-Not Available
Vendor-pdnsdn/a
Product-pdnsdn/a
CWE ID-CWE-399
Not Available
CVE-2007-6040
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.60% / 68.58%
||
7 Day CHG~0.00%
Published-20 Nov, 2007 | 19:00
Updated-07 Aug, 2024 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Belkin F5D7230-4 Wireless G Router allows remote attackers to cause a denial of service (degraded networking and logging) via a flood of TCP SYN packets, a related issue to CVE-1999-0116.

Action-Not Available
Vendor-n/aBelkin International, Inc.
Product-f5d7230-4n/a
CWE ID-CWE-399
Not Available
CVE-2008-5081
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-71.17% / 98.65%
||
7 Day CHG~0.00%
Published-17 Dec, 2008 | 02:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.

Action-Not Available
Vendor-avahin/a
Product-avahin/a
CWE ID-CWE-399
Not Available
CVE-2008-4381
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-30.08% / 96.51%
||
7 Day CHG~0.00%
Published-02 Oct, 2008 | 18:00
Updated-07 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Internet Explorer 7 allows remote attackers to cause a denial of service (application crash) via Javascript that calls the alert function with a URL-encoded string of a large number of invalid characters.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-internet_explorern/a
CWE ID-CWE-399
Not Available
CVE-2008-4685
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.10% / 77.12%
||
7 Day CHG~0.00%
Published-22 Oct, 2008 | 17:00
Updated-07 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the dissect_q931_cause_ie function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via certain packets that trigger an exception.

Action-Not Available
Vendor-n/aWireshark Foundation
Product-wiresharkn/a
CWE ID-CWE-399
Not Available
CVE-2008-5006
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.67% / 70.48%
||
7 Day CHG~0.00%
Published-10 Nov, 2008 | 11:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

smtp.c in the c-client library in University of Washington IMAP Toolkit 2007b allows remote SMTP servers to cause a denial of service (NULL pointer dereference and application crash) by responding to the QUIT command with a close of the TCP connection instead of the expected 221 response code.

Action-Not Available
Vendor-university_of_washingtonn/a
Product-imap_toolkitn/a
CWE ID-CWE-399
Not Available
CVE-2008-3410
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.38% / 79.54%
||
7 Day CHG~0.00%
Published-31 Jul, 2008 | 17:00
Updated-07 Aug, 2024 | 09:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unreal Tournament 3 1.3beta4 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a UDP packet in which the value of a certain size field is greater than the total packet length, aka attack 2 in ut3mendo.c.

Action-Not Available
Vendor-epic_gamesn/a
Product-unreal_tournament_3n/a
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-399
Not Available
CVE-2007-2415
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.77% / 72.53%
||
7 Day CHG~0.00%
Published-01 May, 2007 | 10:00
Updated-07 Aug, 2024 | 13:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pi3Web Web Server 2.0.3 PL1 allows remote attackers to cause a denial of service (application exit) via a long URI. NOTE: this issue was originally reported as a crash, but the vendor states that the impact is a "clean" exit in which "the server I/O loop finishes and the process exits normally."

Action-Not Available
Vendor-pi3webn/a
Product-pi3web_web_servern/a
CWE ID-CWE-399
Not Available
CVE-2016-1584
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-1.6||LOW
EPSS-0.24% / 47.27%
||
7 Day CHG~0.00%
Published-22 Apr, 2019 | 15:35
Updated-17 Sep, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unity8 converged application lifecycle allows background applications to use on-screen keyboard when not top-most

In all versions of Unity8 a running but not active application on a large-screen device could talk with Maliit and consume keyboard input.

Action-Not Available
Vendor-unity8Ubuntu
Product-unity8Unity8
CWE ID-CWE-399
Not Available
CVE-2008-4246
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.39% / 59.11%
||
7 Day CHG~0.00%
Published-25 Sep, 2008 | 19:00
Updated-07 Aug, 2024 | 10:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Denora IRC Stats Server before 1.4.1 allows remote IRC servers to cause a denial of service (application crash) via a crafted CTCP response.

Action-Not Available
Vendor-denora_irc_statsn/a
Product-denora_irc_statsn/a
CWE ID-CWE-399
Not Available
CVE-2008-3215
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.64% / 87.38%
||
7 Day CHG~0.00%
Published-18 Jul, 2008 | 16:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libclamav/petite.c in ClamAV before 0.93.3 allows remote attackers to cause a denial of service via a malformed Petite file that triggers an out-of-bounds memory access. NOTE: this issue exists because of an incomplete fix for CVE-2008-2713.

Action-Not Available
Vendor-clam_anti-virusn/a
Product-clamavn/a
CWE ID-CWE-399
Not Available
CVE-2018-15617
Matching Score-4
Assigner-Avaya, Inc.
ShareView Details
Matching Score-4
Assigner-Avaya, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.38% / 58.30%
||
7 Day CHG~0.00%
Published-01 Feb, 2019 | 15:00
Updated-05 Aug, 2024 | 10:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Communication Manager Denial of Service

A vulnerability in the "capro" (Call Processor) process component of Avaya Aura Communication Manager could allow a remote, unauthenticated user to cause denial of service. Affected versions include 6.3.x, all 7.x versions prior to 7.1.3.2, and all 8.x versions prior to 8.0.1.

Action-Not Available
Vendor-Avaya LLC
Product-aura_communication_managerCommunication Manager
CWE ID-CWE-399
Not Available
CVE-2008-3290
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.01% / 82.97%
||
7 Day CHG~0.00%
Published-24 Jul, 2008 | 17:00
Updated-07 Aug, 2024 | 09:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

retroclient.exe in EMC Dantz Retrospect Backup Client 7.5.116 allows remote attackers to cause a denial of service (daemon crash) via a series of long packets containing 0x00 characters to TCP port 497 that trigger memory corruption, probably involving an English product version on a Chinese OS version.

Action-Not Available
Vendor-emc_dantzn/a
Product-retrospect_backup_clientn/a
CWE ID-CWE-399
Not Available
CVE-2008-3134
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.62% / 81.10%
||
7 Day CHG~0.00%
Published-10 Jul, 2008 | 23:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.

Action-Not Available
Vendor-n/aGraphicsMagick
Product-graphicsmagickn/a
CWE ID-CWE-399
Not Available
CVE-2008-3269
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-12.89% / 93.79%
||
7 Day CHG~0.00%
Published-24 Jul, 2008 | 15:18
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WRPCServer.exe in WinSoftMagic WinRemotePC (WRPC) Lite 2008 and Full 2008 allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet to TCP port 4321.

Action-Not Available
Vendor-winsoftmagicn/a
Product-winremotepc_fullwinremotepc_liten/a
CWE ID-CWE-399
Not Available
CVE-2008-2713
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.21% / 86.54%
||
7 Day CHG~0.00%
Published-16 Jun, 2008 | 21:00
Updated-07 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.

Action-Not Available
Vendor-clam_anti-virusn/a
Product-clamavn/a
CWE ID-CWE-399
Not Available
CVE-2008-3447
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-8.93% / 92.25%
||
7 Day CHG~0.00%
Published-04 Aug, 2008 | 17:00
Updated-07 Aug, 2024 | 09:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The scanning engine in F-Prot Antivirus 6.2.1 4252 allows remote attackers to cause a denial of service (infinite loop) via a malformed ZIP archive, probably related to invalid offsets.

Action-Not Available
Vendor-f-protn/a
Product-f-prot_antivirusscanning_enginen/a
CWE ID-CWE-399
Not Available
CVE-2008-3157
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.77% / 72.48%
||
7 Day CHG~0.00%
Published-11 Jul, 2008 | 22:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nortel SIP Multimedia PC Client 4.x MCS5100 and MCS5200 does not limit the number of concurrent sessions, which allows attackers to cause a denial of service (resource consumption) via a large number of sessions.

Action-Not Available
Vendor-norteln/a
Product-sip_multimedia_pc_clientn/a
CWE ID-CWE-399
Not Available
CVE-2021-1624
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.54% / 66.52%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 02:25
Updated-07 Nov, 2024 | 21:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Rate Limiting Network Address Translation Denial of Service Vulnerability

A vulnerability in the Rate Limiting Network Address Translation (NAT) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization in the Cisco QuantumFlow Processor of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to mishandling of the rate limiting feature within the QuantumFlow Processor. An attacker could exploit this vulnerability by sending large amounts of traffic that would be subject to NAT and rate limiting through an affected device. A successful exploit could allow the attacker to cause the QuantumFlow Processor utilization to reach 100 percent on the affected device, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asr_1013asr_1023asr_1001-x_rasr_1002-hxasr_1001asr_1000ios_xeasr_1001-hx_rasr_1006asr_1002-hx_rasr_1002-x_rasr_1000-xasr_1000-esp100asr_1002asr_1001-xasr_1004asr_1001-hxasr_1002-xasr_1009-xasr_1006-xCisco IOS XE Software
CWE ID-CWE-399
Not Available
CVE-2021-1377
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.39% / 59.34%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:10
Updated-08 Nov, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS and IOS XE Software ARP Resource Management Exhaustion Denial of Service Vulnerability

A vulnerability in Address Resolution Protocol (ARP) management of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent an affected device from resolving ARP entries for legitimate hosts on the connected subnets. This vulnerability exists because ARP entries are mismanaged. An attacker could exploit this vulnerability by continuously sending traffic that results in incomplete ARP entries. A successful exploit could allow the attacker to cause ARP requests on the device to be unsuccessful for legitimate hosts, resulting in a denial of service (DoS) condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeiosCisco IOS
CWE ID-CWE-399
Not Available
CVE-2016-10527
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.33% / 55.63%
||
7 Day CHG~0.00%
Published-31 May, 2018 | 20:00
Updated-17 Sep, 2024 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The riot-compiler version version 2.3.21 has an issue in a regex (Catastrophic Backtracking) thats make it unusable under certain conditions.

Action-Not Available
Vendor-riot.jsHackerOne
Product-riot-compilerriot-compiler node module
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-399
Not Available
CVE-2008-3443
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-34.00% / 96.82%
||
7 Day CHG~0.00%
Published-14 Aug, 2008 | 23:00
Updated-07 Aug, 2024 | 09:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CWE ID-CWE-399
Not Available
CVE-2008-3050
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.34% / 56.29%
||
7 Day CHG~0.00%
Published-07 Jul, 2008 | 18:20
Updated-07 Aug, 2024 | 09:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the PDF Generator 2 (pdf_generator2) extension 0.5.0 and earlier for TYPO3 allows attackers to cause a denial of service via unspecified vectors.

Action-Not Available
Vendor-n/aTYPO3 Association
Product-pdf_generator_2_extensionn/a
CWE ID-CWE-399
Not Available
CVE-2008-3449
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.42% / 87.00%
||
7 Day CHG~0.00%
Published-04 Aug, 2008 | 17:00
Updated-07 Aug, 2024 | 09:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MailEnable Professional 3.5.2 and Enterprise 3.52 allow remote attackers to cause a denial of service (crash) via multiple IMAP connection requests to the same folder.

Action-Not Available
Vendor-mailenablen/a
Product-mailenablen/a
CWE ID-CWE-399
Not Available
CVE-2021-1611
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.44% / 62.38%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 02:30
Updated-07 Nov, 2024 | 21:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers EoGRE Denial of Service Vulnerability

A vulnerability in Ethernet over GRE (EoGRE) packet processing of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9800 Family Wireless Controller, Embedded Wireless Controller, and Embedded Wireless on Catalyst 9000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper processing of malformed EoGRE packets. An attacker could exploit this vulnerability by sending malicious packets to the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xecatalyst_9800-lcatalyst_9800-40catalyst_9800-l-ccatalyst_9800catalyst_9800-clcatalyst_9800-80catalyst_9800-l-fCisco IOS XE Software
CWE ID-CWE-399
Not Available
CVE-2008-2631
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-13.71% / 94.01%
||
7 Day CHG~0.00%
Published-10 Jun, 2008 | 00:00
Updated-07 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WordClient interface in Alt-N Technologies MDaemon 9.6.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted HTTP POST request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Action-Not Available
Vendor-altnn/a
Product-mdaemonn/a
CWE ID-CWE-399
Not Available
CVE-2008-6713
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-7.25% / 91.27%
||
7 Day CHG~0.00%
Published-10 Apr, 2009 | 15:00
Updated-07 Aug, 2024 | 11:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

World in Conflict (WIC) 1.008 and earlier allows remote attackers to cause a denial of service (access violation and crash) via a zero-byte data block to TCP port 48000, which triggers a NULL pointer dereference.

Action-Not Available
Vendor-massive_entertainmentn/a
Product-wicn/a
CWE ID-CWE-399
Not Available
CVE-2008-2005
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-33.52% / 96.79%
||
7 Day CHG~0.00%
Published-06 May, 2008 | 15:00
Updated-07 Aug, 2024 | 08:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SuiteLink Service (aka slssvc.exe) in WonderWare SuiteLink before 2.0 Patch 01, as used in WonderWare InTouch 8.0, allows remote attackers to cause a denial of service (NULL pointer dereference and service shutdown) and possibly execute arbitrary code via a large length value in a Registration packet to TCP port 5413, which causes a memory allocation failure.

Action-Not Available
Vendor-wonderwaren/a
Product-intouchsuitelinkn/a
CWE ID-CWE-399
Not Available
CVE-2008-2382
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-20.88% / 95.41%
||
7 Day CHG~0.00%
Published-24 Dec, 2008 | 17:00
Updated-07 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.

Action-Not Available
Vendor-kvm_qumranetn/aQEMU
Product-qemukvmn/a
CWE ID-CWE-399
Not Available
CVE-2008-2952
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-50.82% / 97.77%
||
7 Day CHG~0.00%
Published-01 Jul, 2008 | 21:00
Updated-07 Aug, 2024 | 09:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.

Action-Not Available
Vendor-openldapn/a
Product-openldapn/a
CWE ID-CWE-399
Not Available
CVE-2008-2956
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.95% / 75.42%
||
7 Day CHG~0.00%
Published-01 Jul, 2008 | 00:00
Updated-07 Aug, 2024 | 09:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in Pidgin 2.0.0, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption) via malformed XML documents. NOTE: this issue has been disputed by the upstream vendor, who states: "I was never able to identify a scenario under which a problem occurred and the original reporter wasn't able to supply any sort of reproduction details."

Action-Not Available
Vendor-n/aPidgin
Product-pidginn/a
CWE ID-CWE-399
Not Available
CVE-2008-1996
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-20.31% / 95.30%
||
7 Day CHG~0.00%
Published-28 Apr, 2008 | 18:21
Updated-07 Aug, 2024 | 08:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

licq before 1.3.6 allows remote attackers to cause a denial of service (file-descriptor exhaustion and application crash) via a large number of connections.

Action-Not Available
Vendor-licqn/a
Product-licqn/a
CWE ID-CWE-399
Not Available
CVE-2008-2014
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.19% / 78.00%
||
7 Day CHG~0.00%
Published-30 Apr, 2008 | 01:00
Updated-07 Aug, 2024 | 08:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox 3.0 beta 5 allows remote attackers to cause a denial of service (application crash) via JavaScript code that calls document.write in an infinite loop.

Action-Not Available
Vendor-n/aMozilla Corporation
Product-firefoxn/a
CWE ID-CWE-399
Not Available
CVE-2008-1927
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.90% / 85.81%
||
7 Day CHG~0.00%
Published-23 Apr, 2008 | 17:00
Updated-07 Aug, 2024 | 08:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.

Action-Not Available
Vendor-perln/a
Product-perln/a
CWE ID-CWE-399
Not Available
CVE-2008-1851
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.47% / 84.67%
||
7 Day CHG~0.00%
Published-16 Apr, 2008 | 18:00
Updated-07 Aug, 2024 | 08:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ovalarmsrv in HP OpenView Network Node Manager (OV NNM) 7.51, 7.53, and possibly other versions allows remote attackers to cause a denial of service (hang) via certain requests that do not provide all required arguments.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_network_node_managern/a
CWE ID-CWE-399
Not Available
CVE-2008-1689
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.19% / 77.98%
||
7 Day CHG~0.00%
Published-07 Apr, 2008 | 17:00
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack consumption vulnerability in WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (daemon crash) via a long request header in an HTTP request to TCP port 801. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-seattle_lab_softwaren/a
Product-slmail_pron/a
CWE ID-CWE-399
Not Available
CVE-2008-4298
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.58% / 85.00%
||
7 Day CHG~0.00%
Published-27 Sep, 2008 | 00:00
Updated-07 Aug, 2024 | 10:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in the http_request_parse function in request.c in lighttpd before 1.4.20 allows remote attackers to cause a denial of service (memory consumption) via a large number of requests with duplicate request headers.

Action-Not Available
Vendor-lighttpdn/a
Product-lighttpdn/a
CWE ID-CWE-399
Not Available
CVE-2008-0927
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-85.11% / 99.30%
||
7 Day CHG~0.00%
Published-14 Apr, 2008 | 16:00
Updated-07 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

dhost.exe in Novell eDirectory 8.7.3 before sp10 and 8.8.2 allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with (1) multiple Connection headers or (2) a Connection header with multiple comma-separated values. NOTE: this might be similar to CVE-2008-1777.

Action-Not Available
Vendor-n/aNovellMicrosoft Corporation
Product-edirectorywindows-ntn/a
CWE ID-CWE-399
Not Available
CVE-2008-1389
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-8.61% / 92.07%
||
7 Day CHG~0.00%
Published-04 Sep, 2008 | 16:00
Updated-07 Aug, 2024 | 08:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libclamav/chmunpack.c in the chm-parser in ClamAV before 0.94 allows remote attackers to cause a denial of service (application crash) via a malformed CHM file, related to an "invalid memory access."

Action-Not Available
Vendor-clam_anti-virusn/a
Product-clamavn/a
CWE ID-CWE-399
Not Available
CVE-2008-1438
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5||MEDIUM
EPSS-43.71% / 97.43%
||
7 Day CHG~0.00%
Published-13 May, 2008 | 22:00
Updated-07 Aug, 2024 | 08:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (disk space exhaustion) via a file with "crafted data structures" that trigger the creation of large temporary files, a different vulnerability than CVE-2008-1437.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-forefront_security_for_exchange_serverforefront_client_securityantigen_for_exchangewindows_live_onecareforefront_security_for_sharepointdiagnostics_and_recovery_toolkitantigen_for_smtp_gatewaymalware_protection_enginewindows_defendern/a
CWE ID-CWE-399
Not Available
CVE-2008-0983
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.18% / 88.27%
||
7 Day CHG~0.00%
Published-26 Feb, 2008 | 18:00
Updated-07 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

lighttpd 1.4.18, and possibly other versions before 1.5.0, does not properly calculate the size of a file descriptor array, which allows remote attackers to cause a denial of service (crash) via a large number of connections, which triggers an out-of-bounds access.

Action-Not Available
Vendor-lighttpdn/a
Product-lighttpdn/a
CWE ID-CWE-399
Not Available
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next
Details not found