All the vulnerabilites related to microsoft - windows-nt
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
apple | quicktime | * | |
apple | quicktime | 7.0 | |
apple | quicktime | 7.0.1 | |
apple | quicktime | 7.0.2 | |
apple | quicktime | 7.0.3 | |
apple | quicktime | 7.0.4 | |
apple | quicktime | 7.1 | |
apple | quicktime | 7.1.1 | |
apple | quicktime | 7.1.2 | |
apple | quicktime | 7.1.3 | |
apple | quicktime | 7.1.4 | |
apple | quicktime | 7.1.5 | |
apple | quicktime | 7.1.6 | |
apple | quicktime | 7.2 | |
apple | quicktime | 7.3 | |
apple | quicktime | 7.3.1 | |
apple | quicktime | 7.3.1.70 | |
apple | quicktime | 7.4 | |
apple | quicktime | 7.4.1 | |
apple | quicktime | 7.4.5 | |
microsoft | windows-nt | xp | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "matchCriteriaId": "70DDAE09-0183-4BF4-8053-D80E6AE9F1C2", "versionEndIncluding": "7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F075BA0F-4A96-4F25-AF1D-C64C7DCE1CDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8692B488-129A-49EA-AF84-6077FCDBB898", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1758610B-3789-489E-A751-386D605E5A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B535737C-BF32-471C-B26A-588632FCC427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF2C61F8-B376-40F9-8677-CADCC3295915", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "6254BB56-5A25-49DC-A851-3CCA249BD71D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "795E3354-7824-4EF4-A788-3CFEB75734E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9419A1E9-A0DA-4846-8959-BE50B53736E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "952A8015-B18B-481C-AC17-60F0D7EEE085", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E518B27-A79B-43A4-AFA6-E59EF8E944D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AEC6EF36-93B3-49BB-9A6F-1990E3F4170E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1A1B5F2F-CDBF-4AEF-9F78-0C010664B9E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "98C9B657-5484-4458-861E-D6FB5019265A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "1EF20D38-BFA3-4403-AB24-7B74EFD68229", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2CE2A89-B2FC-413D-A059-526E6DE301BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*", "matchCriteriaId": "7F9F7DCE-EE65-4CD5-AA21-208B2AAF09EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "31662D02-7FA9-4FAD-BE49-194B7295CEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8461AF0A-D4D3-4010-A881-EDBB95003083", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "5C8E5C77-573F-4EA3-A59C-4A7B11946E93", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Apple QuickTime before 7.5.5 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PICT image, which triggers heap corruption." }, { "lang": "es", "value": "Desbordamiento de entero en Apple QuickTime anterior 7.5.5 sobre Windows, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de una imagen PICT manipulada que lanza un corrupci\u00f3n de mont\u00edculo (heap)." } ], "id": "CVE-2008-3614", "lastModified": "2024-11-21T00:49:40.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-09-11T01:13:09.243", "references": [ { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=744" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31821" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31882" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1020841" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3027" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3137" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31086" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020879" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2584" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1020841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15851" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
apple | quicktime | * | |
apple | quicktime | 7.0 | |
apple | quicktime | 7.0.1 | |
apple | quicktime | 7.0.2 | |
apple | quicktime | 7.0.3 | |
apple | quicktime | 7.0.4 | |
apple | quicktime | 7.1 | |
apple | quicktime | 7.1.1 | |
apple | quicktime | 7.1.2 | |
apple | quicktime | 7.1.3 | |
apple | quicktime | 7.1.4 | |
apple | quicktime | 7.1.5 | |
apple | quicktime | 7.1.6 | |
apple | quicktime | 7.2 | |
apple | quicktime | 7.3 | |
apple | quicktime | 7.3.1 | |
apple | quicktime | 7.3.1.70 | |
apple | quicktime | 7.4 | |
apple | quicktime | 7.4.1 | |
apple | quicktime | 7.4.5 | |
apple | mac_os_x | 10.4.9 | |
apple | mac_os_x | 10.4.10 | |
apple | mac_os_x | 10.4.11 | |
apple | mac_os_x | 10.5 | |
apple | mac_os_x | 10.5.1 | |
apple | mac_os_x | 10.5.2 | |
apple | mac_os_x | 10.5.3 | |
apple | mac_os_x | 10.5.4 | |
microsoft | windows-nt | xp | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "matchCriteriaId": "70DDAE09-0183-4BF4-8053-D80E6AE9F1C2", "versionEndIncluding": "7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F075BA0F-4A96-4F25-AF1D-C64C7DCE1CDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8692B488-129A-49EA-AF84-6077FCDBB898", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1758610B-3789-489E-A751-386D605E5A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B535737C-BF32-471C-B26A-588632FCC427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF2C61F8-B376-40F9-8677-CADCC3295915", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "6254BB56-5A25-49DC-A851-3CCA249BD71D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "795E3354-7824-4EF4-A788-3CFEB75734E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9419A1E9-A0DA-4846-8959-BE50B53736E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "952A8015-B18B-481C-AC17-60F0D7EEE085", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E518B27-A79B-43A4-AFA6-E59EF8E944D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AEC6EF36-93B3-49BB-9A6F-1990E3F4170E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1A1B5F2F-CDBF-4AEF-9F78-0C010664B9E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "98C9B657-5484-4458-861E-D6FB5019265A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "1EF20D38-BFA3-4403-AB24-7B74EFD68229", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2CE2A89-B2FC-413D-A059-526E6DE301BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*", "matchCriteriaId": "7F9F7DCE-EE65-4CD5-AA21-208B2AAF09EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "31662D02-7FA9-4FAD-BE49-194B7295CEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8461AF0A-D4D3-4010-A881-EDBB95003083", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "5C8E5C77-573F-4EA3-A59C-4A7B11946E93", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "8D089858-3AF9-4B82-912D-AA33F25E3715", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "D2442D35-7484-43D8-9077-3FDF63104816", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3F3E721C-00CA-4D51-B542-F2BC5C0D65BF", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3267A41-1AE0-48B8-BD1F-DEC8A212851A", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "855288F1-0242-4951-AB3F-B7AF13E21CF6", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "10082781-B93E-4B84-94F2-FA9749B4D92B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Apple QuickTime before 7.5.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a QuickTime Virtual Reality (QTVR) movie file with crafted panorama atoms." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en Apple Quicktime anterior a 7.7.5 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n)a trav\u00e9s de una pel\u00edcula QuickTime Virtual Reality (QTVR)con \u00e1tomos panorama manipulados." } ], "id": "CVE-2008-3624", "lastModified": "2024-11-21T00:49:43.043", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-09-11T01:13:09.757", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31821" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1020841" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3027" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31086" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1020841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16124" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:gold:server_x64:*:*:*:*:*", "matchCriteriaId": "6B0F7775-1068-4A05-91FC-E1F6634F855A", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server:*:*:*:*:*", "matchCriteriaId": "9B437168-290C-460E-AF10-BB373054856B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server_itanium:*:*:*:*:*", "matchCriteriaId": "9929BFAC-3FFC-4836-B8D5-2947BC6B496E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server:*:*:*:*:*", "matchCriteriaId": "D76A280A-3E99-4A58-94D7-F92F8A9414D2", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_itanium:*:*:*:*:*", "matchCriteriaId": "1BCA8432-4F15-40FB-AC89-8F26AE1EFE32", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_x64:*:*:*:*:*", "matchCriteriaId": "F538C690-E6B0-4F50-9306-28FA55B4F8EB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:gold:x64:*:*:*:*:*", "matchCriteriaId": "55F983ED-1270-4CF5-8DD1-006899EAE892", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A419F50E-F32C-461C-95D0-978C5351FBAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:gold:server_x64:*:*:*:*:*", "matchCriteriaId": "6B0F7775-1068-4A05-91FC-E1F6634F855A", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server:*:*:*:*:*", "matchCriteriaId": "9B437168-290C-460E-AF10-BB373054856B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server_itanium:*:*:*:*:*", "matchCriteriaId": "9929BFAC-3FFC-4836-B8D5-2947BC6B496E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server:*:*:*:*:*", "matchCriteriaId": "D76A280A-3E99-4A58-94D7-F92F8A9414D2", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_itanium:*:*:*:*:*", "matchCriteriaId": "1BCA8432-4F15-40FB-AC89-8F26AE1EFE32", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_x64:*:*:*:*:*", "matchCriteriaId": "F538C690-E6B0-4F50-9306-28FA55B4F8EB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:itanium:*:*:*:*:*", "matchCriteriaId": "59F8A83B-899C-47CE-B444-E8B4AC7723C7", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*", "matchCriteriaId": "2B89E436-C99E-4F68-AADD-E5980B346E95", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:gold:x64:*:*:*:*:*", "matchCriteriaId": "55F983ED-1270-4CF5-8DD1-006899EAE892", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "0BF6AE15-EAC3-4100-A742-211026C79CCC", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:gold:server_x64:*:*:*:*:*", "matchCriteriaId": "6B0F7775-1068-4A05-91FC-E1F6634F855A", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server:*:*:*:*:*", "matchCriteriaId": "9B437168-290C-460E-AF10-BB373054856B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server_itanium:*:*:*:*:*", "matchCriteriaId": "9929BFAC-3FFC-4836-B8D5-2947BC6B496E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server:*:*:*:*:*", "matchCriteriaId": "D76A280A-3E99-4A58-94D7-F92F8A9414D2", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_itanium:*:*:*:*:*", "matchCriteriaId": "1BCA8432-4F15-40FB-AC89-8F26AE1EFE32", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_x64:*:*:*:*:*", "matchCriteriaId": "F538C690-E6B0-4F50-9306-28FA55B4F8EB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:gold:media_center_2005:*:*:*:*:*", "matchCriteriaId": "1D07E13E-659F-480C-B8BA-F62D4B9B5234", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:gold:tablet_pc_2005:*:*:*:*:*", "matchCriteriaId": "59E405A0-8A83-4003-9398-4DDCB28BBAAA", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:gold:x64:*:*:*:*:*", "matchCriteriaId": "55F983ED-1270-4CF5-8DD1-006899EAE892", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:1.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "B4B659D4-6EDD-4A31-A7CC-70B12EBEB4D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework without the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a \"\u003c/\" (less-than slash) sequence." }, { "lang": "es", "value": "Validaci\u00f3n de la petici\u00f3n (tambi\u00e9n conocido como los filtros ValidateRequest) en ASP.NET de Microsoft .NET Framework sin la actualizaci\u00f3n MS07-040 no detecta correctamente entradas de cliente peligrosas, lo cual permite a atacantes remotos llevar a cabo un ataque de secuencia de comandos en sitios cruzados (XSS), como lo demostrado por una cadena de consulta que contiene una secuencia \"\u003c/\" (menos-que barra invertida)." } ], "id": "CVE-2008-3842", "lastModified": "2024-11-21T00:50:15.013", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-08-27T20:41:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/4193" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/495667/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/4193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/495667/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44741" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
apple | bonjour | 1.0.4 | |
microsoft | windows-nt | xp | |
microsoft | windows_2000 | - | |
microsoft | windows_2003_server | - | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:bonjour:1.0.4:unknown:windows:*:*:*:*:*", "matchCriteriaId": "1ACABF55-DE3F-463A-A469-A76589C3AAB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAA86830-BEA8-4943-83EA-C267FA534223", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mDNSResponder in Apple Bonjour for Windows before 1.0.5, when an application uses the Bonjour API for unicast DNS, does not choose random values for transaction IDs or source ports in DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447." }, { "lang": "es", "value": "mDNSResponder en Apple Bonjour para Windows anterior a 1.0.5, cuando una aplicaci\u00f3n usa la API Bonjour para DNS unicast, no escoge valores aleatorios para las transacciones IDs u origen de puertos en las peticiones DNS, lo que facilita a atacantes remotos falsear las respuestas DNS. Vulnerabilidad distinta de CVE-2008-1447." } ], "id": "CVE-2008-3630", "lastModified": "2024-11-21T00:49:43.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-09-11T01:13:09.913", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31822" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT2990" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31093" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020844" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT2990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2524" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | xp | |
microsoft | windows_vista | * | |
microsoft | windows_xp | * | |
microsoft | windows_xp | * | |
microsoft | windows_xp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*", "matchCriteriaId": "ACF75FC8-095A-4EEA-9A41-C27CFF3953FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bluetooth stack in Microsoft Windows XP SP2 and SP3, and Vista Gold and SP1, allows physically proximate attackers to execute arbitrary code via a large series of Service Discovery Protocol (SDP) packets." }, { "lang": "es", "value": "La pila Bluetooth en Microsoft Windows XP SP2 y SP3, y Vista Gold y SP1 permite a atacantes fisicamente pr\u00f3ximos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una larga serie de paquetes Service Discovery Protocol (SDP)." } ], "id": "CVE-2008-1453", "lastModified": "2024-11-21T00:44:34.797", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-06-12T02:32:00.000", "references": [ { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/30051" }, { "source": "secure@microsoft.com", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1020221" }, { "source": "secure@microsoft.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/29522" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "source": "secure@microsoft.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1777" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-030" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4730" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/30051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1020221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/29522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4730" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | digital_image_suite | 2006 | |
microsoft | forefront_client_security | 1.0 | |
microsoft | internet_explorer | 6 | |
microsoft | office | 2003 | |
microsoft | office | 2003 | |
microsoft | office | xp | |
microsoft | office_powerpoint_viewer | 2003 | |
microsoft | report_viewer | 2005 | |
microsoft | report_viewer | 2008 | |
microsoft | server | 2008 | |
microsoft | sql_server | 2005 | |
microsoft | sql_server_reporting_services | 2000 | |
microsoft | visio | 2002 | |
microsoft | works | 8.0 | |
microsoft | office_system | * | |
microsoft | office_system | * | |
microsoft | windows | 2003_server | |
microsoft | windows | 2003_server | |
microsoft | windows-nt | vista | |
microsoft | windows-nt | xp | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:digital_image_suite:2006:*:*:*:*:*:*:*", "matchCriteriaId": "24F42695-7FB7-4C43-A9A7-8A234B6E5937", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:forefront_client_security:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "578221F3-4C20-4A3F-A286-5A4680E8785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "matchCriteriaId": "D47247A3-7CD7-4D67-9D9B-A94A504DA1BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "matchCriteriaId": "07D3F3E4-93FB-481A-94D9-075E726697C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office_powerpoint_viewer:2003:*:*:*:*:*:*:*", "matchCriteriaId": "A5440EF5-462B-4BAC-AF60-44C5D649D0D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:report_viewer:2005:sp1:*:*:*:*:*:*", "matchCriteriaId": "033138E1-82C7-443C-89C1-23D8032674CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:report_viewer:2008:*:*:*:*:*:*:*", "matchCriteriaId": "30E84216-227B-4074-B65B-6AA399D4A8DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*", "matchCriteriaId": "FAE680C6-F940-4095-BDD5-05CBD8DA14DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:*:*", "matchCriteriaId": "26423C70-4475-4D7E-8CC0-D8CFADE16B26", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:sql_server_reporting_services:2000:sp2:*:*:*:*:*:*", "matchCriteriaId": "377777D4-0649-4732-9E38-E4074056C561", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*", "matchCriteriaId": "D0D2C5C3-225C-49DC-B9C7-C5BC05900F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "293914AF-6101-4F50-9560-A4EA99D767C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:office_system:*:gold:*:*:*:*:*:*", "matchCriteriaId": "D08AE69C-A8E4-4291-AE45-C311BA8168D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:office_system:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "9E27318C-A079-40D4-8994-96C6809CA1FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*", "matchCriteriaId": "CFC4CDAF-F0C4-4B7D-9692-5E73C489F5A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows:2003_server:sp2:*:*:*:*:*:*", "matchCriteriaId": "6265A492-BDB8-4A41-A5D1-9947C8EF002E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:*:gold:*:*:*:*:*", "matchCriteriaId": "85442DDD-DFB0-455D-8078-EFE49ABC60B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via an image file with crafted gradient sizes in gradient fill input, which triggers a heap-based buffer overflow related to GdiPlus.dll and VGX.DLL, aka \"GDI+ VML Buffer Overrun Vulnerability.\"" }, { "lang": "es", "value": "Desbordamiento de enteros en GDI+ en Microsoft Internet Explorer versi\u00f3n 6 SP1, Windows XP SP2 y SP3, Server 2003 SP1 y SP2, Vista Gold y SP1, Server 2008, Office XP SP3, Office 2003 SP2 y SP3, 2007 Microsoft Office System Gold y SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works versi\u00f3n 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 y 2008, y Forefront Client Security versi\u00f3n 1.0, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo de imagen con tama\u00f1o degradado creados en la entrada de relleno de degradado, que activa un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria relacionado con las bibliotecas GdiPlus.dll y VGX.DLL, tambi\u00e9n se conoce como \"GDI+ VML Buffer Overrun Vulnerability.\"" } ], "id": "CVE-2007-5348", "lastModified": "2024-11-21T00:37:42.250", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-09-11T01:01:19.430", "references": [ { "source": "secure@microsoft.com", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=743" }, { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32154" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/bid/31018" }, { "source": "secure@microsoft.com", "url": "http://www.securitytracker.com/id?1020834" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2520" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6055" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | vista | |
microsoft | windows-nt | xp | |
microsoft | windows_2000 | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_vista | - | |
microsoft | windows_xp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:*:gold:*:*:*:*:*", "matchCriteriaId": "85442DDD-DFB0-455D-8078-EFE49ABC60B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "FE8F4276-4D97-480D-A542-FE9982FFD765", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate per-user subscriptions, which allows remote authenticated users to execute arbitrary code via a crafted event subscription request." }, { "lang": "es", "value": "El Sistema de Eventos en Microsoft Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP1 y SP2, Vista Gold y SP1 y Server 2008 no valida correctamente las subscripciones por usuario, lo que permite a usuarios autentificados remotamente ejecutar c\u00f3digo de su elecci\u00f3n mediante una petici\u00f3n de subscripci\u00f3n a un evento manipulada." } ], "id": "CVE-2008-1457", "lastModified": "2024-11-21T00:44:35.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-13T12:42:00.000", "references": [ { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/31417" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/bid/30584" }, { "source": "secure@microsoft.com", "url": "http://www.securitytracker.com/id?1020677" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "source": "secure@microsoft.com", "url": "http://www.vupen.com/english/advisories/2008/2353" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/31417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6095" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | digital_image_suite | 2006 | |
microsoft | forefront_client_security | 1.0 | |
microsoft | internet_explorer | 6 | |
microsoft | office | 2003 | |
microsoft | office | 2003 | |
microsoft | office | 2007 | |
microsoft | office | 2007 | |
microsoft | office | xp | |
microsoft | office_powerpoint_viewer | 2003 | |
microsoft | report_viewer | 2005 | |
microsoft | report_viewer | 2008 | |
microsoft | server | 2008 | |
microsoft | sql_server | 2005 | |
microsoft | sql_server_reporting_services | 2000 | |
microsoft | visio | 2002 | |
microsoft | works | 8.0 | |
microsoft | server | 2003 | |
microsoft | server | 2003 | |
microsoft | windows-nt | vista | |
microsoft | windows-nt | xp | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:digital_image_suite:2006:*:*:*:*:*:*:*", "matchCriteriaId": "24F42695-7FB7-4C43-A9A7-8A234B6E5937", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:forefront_client_security:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "578221F3-4C20-4A3F-A286-5A4680E8785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "matchCriteriaId": "D47247A3-7CD7-4D67-9D9B-A94A504DA1BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "matchCriteriaId": "07D3F3E4-93FB-481A-94D9-075E726697C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2007:*:gold:*:*:*:*:*", "matchCriteriaId": "E438882E-1AAE-477E-B885-D4E95D2AE88A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*", "matchCriteriaId": "69E6B9EB-D3F7-4C57-BF2F-61664E5C2C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office_powerpoint_viewer:2003:*:*:*:*:*:*:*", "matchCriteriaId": "A5440EF5-462B-4BAC-AF60-44C5D649D0D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:report_viewer:2005:sp1:*:*:*:*:*:*", "matchCriteriaId": "033138E1-82C7-443C-89C1-23D8032674CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:report_viewer:2008:*:*:*:*:*:*:*", "matchCriteriaId": "30E84216-227B-4074-B65B-6AA399D4A8DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*", "matchCriteriaId": "FAE680C6-F940-4095-BDD5-05CBD8DA14DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:*:*", "matchCriteriaId": "26423C70-4475-4D7E-8CC0-D8CFADE16B26", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:sql_server_reporting_services:2000:sp2:*:*:*:*:*:*", "matchCriteriaId": "377777D4-0649-4732-9E38-E4074056C561", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*", "matchCriteriaId": "D0D2C5C3-225C-49DC-B9C7-C5BC05900F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "293914AF-6101-4F50-9560-A4EA99D767C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:server:2003:sp1:*:*:*:*:*:*", "matchCriteriaId": "4997ED74-FF5F-43AC-BA74-4DD6B96DEA9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:server:2003:sp2:*:*:*:*:*:*", "matchCriteriaId": "C4AC635E-5246-4200-9EC1-81D0F2072934", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:*:gold:*:*:*:*:*", "matchCriteriaId": "85442DDD-DFB0-455D-8078-EFE49ABC60B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed WMF image file that triggers improper memory allocation, aka \"GDI+ WMF Buffer Overrun Vulnerability.\"" }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en gdiplus.dll en GDI+ en Microsoft Internet Explorer 6 SP1, Windows XP SP2 y SP3, Server 2003 SP1 y SP2, Vista Gold y SP1, Server 2008, Office XP SP3, Office 2003 SP2 y SP3, 2007 Microsoft Office System Gold y SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 y 2008, y Forefront Client Security 1.0, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo de imagen WMF que lanza una asignaci\u00f3n de memoria inadecuada, tambi\u00e9n conocida como \"Vulnerabilidad GDI+ WMF Buffer Overrun\"." } ], "id": "CVE-2008-3014", "lastModified": "2024-11-21T00:48:13.937", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-09-11T01:11:47.117", "references": [ { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "secure@microsoft.com", "url": "http://secunia.com/advisories/32154" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/bid/31021" }, { "source": "secure@microsoft.com", "url": "http://www.securitytracker.com/id?1020837" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "source": "secure@microsoft.com", "url": "http://www.vupen.com/english/advisories/2008/2520" }, { "source": "secure@microsoft.com", "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6004" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows | 3.1 | |
microsoft | windows-nt | 95 | |
microsoft | windows-nt | 98 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | me | |
microsoft | windows_2000 | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_vista | * | |
microsoft | windows_xp | * | |
pixelpost | pixelpost | 1.7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "090CBBD5-84E6-41B3-A296-9DE7ED1E0D0B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:95:*:*:*:*:*:*:*", "matchCriteriaId": "CD82FB3B-CD00-4CB2-9957-B27E8D13DD04", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:98:*:*:*:*:*:*:*", "matchCriteriaId": "446095CB-FCDA-41F0-B3FC-4A3ECCDFBA51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:me:*:*:*:*:*:*:*", "matchCriteriaId": "E4CFBC34-E9D4-4DC3-B710-339CC12D14FF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "60EC86B8-5C8C-4873-B364-FB1F8EFE1CFF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*", "matchCriteriaId": "E61F1C9B-44AF-4B35-A7B2-948EEF7639BD", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:pixelpost:pixelpost:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "EA126D79-DFBA-48ED-AC67-B6DA5CC7F559", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in index.php in Pixelpost 1.7.1 on Windows, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language_full parameter." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en index.php en Pixelpost 1.7.1 sobre Windows, cuando \"register_globals\" est\u00e1 activado, permite a atacantes remotos incluir y ejecutar archivos locales a trav\u00e9s de .. (punto punto) en el par\u00e1metro \"languaje_full\"." } ], "id": "CVE-2008-3365", "lastModified": "2024-11-21T00:49:04.547", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-07-30T17:41:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31239" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4062" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/494817/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/30397" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2207/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44031" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/6150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/494817/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/30397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2207/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6150" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | vista | |
microsoft | windows_vista | * | |
realtek | hd_audio_codec_drivers | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:*:x32:*:*:*:*:*", "matchCriteriaId": "8C7E0F58-4948-4785-816F-6B2DC5FEA18E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:realtek:hd_audio_codec_drivers:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B3CDE37-6440-4047-81C5-8E398373EEF6", "versionEndIncluding": "6.0.1.5604", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allow local users to create, write, and read registry keys via a crafted IOCTL request." }, { "lang": "es", "value": "Los Drivers para los Codec de Audio de Realtek HD, RTKVHDA.sys y RTKVHDA64.sys, versiones anteriores a 6.0.1.5605 en Windows Vista, permite a usuarios locales crear, escribir y registrar claves a trav\u00e9s de una petici\u00f3n IOCTL manipulada." } ], "id": "CVE-2008-1931", "lastModified": "2024-11-21T00:45:41.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-25T06:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29953" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/491249/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28909" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1350/references" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.wintercore.com/advisories/advisory_W010408.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/491249/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1350/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.wintercore.com/advisories/advisory_W010408.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41976" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | 2008 | |
microsoft | windows_vista | * | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Windows Vista through SP1 and Server 2008 do not properly import the default IPsec policy from a Windows Server 2003 domain to a Windows Server 2008 domain, which prevents IPsec rules from being enforced and allows remote attackers to bypass intended access restrictions." }, { "lang": "es", "value": "Microsoft Windows Vista SP1 y Server 2008 no importan de forma apropiada la pol\u00edtica IPsec por defecto de un dominio Windows 2003 Server, lo que evita que las reglas de IPsec puedan ser reforzadas y permite a los atacantes que eviten las restricciones pretendidas." } ], "id": "CVE-2008-2246", "lastModified": "2024-11-21T00:46:26.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-13T00:41:00.000", "references": [ { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/31411" }, { "source": "secure@microsoft.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30634" }, { "source": "secure@microsoft.com", "url": "http://www.securitytracker.com/id?1020678" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "source": "secure@microsoft.com", "url": "http://www.vupen.com/english/advisories/2008/2351" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-047" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/31411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020678" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6060" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | edirectory | * | |
novell | edirectory | * | |
microsoft | windows-nt | 2000 | |
microsoft | windows-nt | 2003 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:edirectory:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B50CE5C-1108-405A-8FE9-C12542F774A2", "versionEndIncluding": "8.7.3.9", "vulnerable": false }, { "criteria": "cpe:2.3:a:novell:edirectory:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CC8C64B-A5E6-4022-B55A-F2E80AB3D8F3", "versionEndExcluding": "8.8.2", "versionStartIncluding": "8.8", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2000:*:*:*:*:*:*:*", "matchCriteriaId": "4EA9CCBA-D930-4EC2-9C51-C44B52A2B69F", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:*:*:*:*:*:*:*", "matchCriteriaId": "CADAB8CD-9972-4535-9963-80A3EDB57925", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dhost.exe in Novell eDirectory 8.7.3 before sp10 and 8.8.2 allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with (1) multiple Connection headers or (2) a Connection header with multiple comma-separated values. NOTE: this might be similar to CVE-2008-1777." }, { "lang": "es", "value": "El archivo dhost.exe en Novell eDirectory versi\u00f3n 8.7.3 anterior a las versiones sp10 y 8.8.2 permite a los atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) por medio de una petici\u00f3n HTTP con (1) varios encabezados de conexi\u00f3n o (2) un encabezado de conexi\u00f3n con varios valores separados por comas. NOTA: esta vulnerabilidad podr\u00eda ser similar a CVE-2008-1777." } ], "id": "CVE-2008-0927", "lastModified": "2024-11-21T00:43:14.720", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-14T16:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/29805" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3829452\u0026sliceId=1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/491622/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/28757" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1019836" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1217/references" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41787" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/5547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/29805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3829452\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/491622/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/28757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1019836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1217/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/5547" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows_media_player | 11 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | xp | |
microsoft | windows-nt | xp | |
microsoft | windows-nt | xp | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:windows_media_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "B27BB8B0-BC24-4A3F-A18B-63D57AB4799B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:x64:*", "matchCriteriaId": "70865C35-CABD-4731-8043-BF358E0EFC7F", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:*:*:*:gold:*:x64:*", "matchCriteriaId": "5DF33FF8-899B-40B2-AF84-E37D8CC6B422", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp2:*:*:pro:*:x64:*", "matchCriteriaId": "97A263BB-2103-4047-A8AB-1AB46EC73120", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Microsoft Windows Media Player 11 allows remote attackers to execute arbitrary code via a crafted audio-only file that is streamed from a Server-Side Playlist (SSPL) on Windows Media Server, aka \"Windows Media Player Sampling Rate Vulnerability.\"" }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Microsoft Windows Media Player 11, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo \"audio-only\" manipulado cuyo origen del flujo es un Server-Side Playlist (SSPL) sobre Windows Media Server, tambi\u00e9n conocida como \"Vulnerabilidad Windows Media Player Sampling Rate.\"" } ], "evaluatorComment": "http://www.microsoft.com/technet/security/Bulletin/MS08-054.mspx\r\n\r\n\r\nSecurity updates are available from Microsoft Update, Windows Update, and Office Update. Security updates are also available from the Microsoft Download Center. You can find them most easily by doing a keyword search for \"security update.\r\n\r\n*Windows Server 2008 server core installation not affected. The vulnerability addressed by this update does not affect supported editions of Windows Server 2008 if Windows Server 2008 was installed using the Server Core installation option, even though the files affected by this vulnerability may be present on the system. However, users with the affected files will still be offered this update because the update files are newer (with higher version numbers) than the files that are currently on your system. For more information on this installation option, see Server Core. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008; see Compare Server Core Installation Options.", "id": "CVE-2008-2253", "lastModified": "2024-11-21T00:46:26.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-09-11T01:10:13.540", "references": [ { "source": "secure@microsoft.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Broken Link" ], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=766863#PRODUCTS" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/30550" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1020831" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2522" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-054" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=766863#PRODUCTS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/30550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1020831" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5615" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | vista | |
microsoft | windows-nt | xp | |
microsoft | windows_2000 | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_vista | - | |
microsoft | windows_xp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:*:gold:*:*:*:*:*", "matchCriteriaId": "85442DDD-DFB0-455D-8078-EFE49ABC60B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "FE8F4276-4D97-480D-A542-FE9982FFD765", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Array index vulnerability in the Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote authenticated users to execute arbitrary code via a crafted event subscription request that is used to access an array of function pointers." }, { "lang": "es", "value": "Vulnerabilidad de \u00edndice de array en el Sistema de Eventos de Microsoft Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP1 y SP2, Vista Gold y SP1 y Server 2008 permite a usuarios autentificados remotamente ejecutar c\u00f3digo de su elecci\u00f3n mediante una petici\u00f3n de subscripci\u00f3n a un evento manipulada que se utiliza para acceder a un array de punteros de una funci\u00f3n." } ], "id": "CVE-2008-1456", "lastModified": "2024-11-21T00:44:35.137", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-13T12:42:00.000", "references": [ { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/31417" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/bid/30586" }, { "source": "secure@microsoft.com", "url": "http://www.securitytracker.com/id?1020677" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "source": "secure@microsoft.com", "url": "http://www.vupen.com/english/advisories/2008/2353" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5630" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/31417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5630" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | xp | |
microsoft | windows_2000 | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_xp | * | |
microsoft | windows_xp | * | |
microsoft | windows_xp | * | |
microsoft | directx | 9.0 | |
microsoft | windows_2000 | * | |
microsoft | directx | 7.0 | |
microsoft | directx | 8.1 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows_vista | * | |
microsoft | directx | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*", "matchCriteriaId": "CD264C73-360E-414D-BE22-192F92E5A0A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "FE8F4276-4D97-480D-A542-FE9982FFD765", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:itanium:*:*:*:*:*", "matchCriteriaId": "972ADDBC-5D6E-48D5-9DB7-44FE0539807D", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "matchCriteriaId": "F7EFB032-47F4-4497-B16B-CB9126EAC9DF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "6881476D-81A2-4DFD-AC77-82A8D08A0568", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*", "matchCriteriaId": "ACF75FC8-095A-4EEA-9A41-C27CFF3953FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:directx:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2936E9C2-65E6-4D26-A277-FF2AE13A3FEC", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:directx:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "2BFE77B9-6C2A-45D3-A4B5-2679CC4B0DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:directx:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "8FF0278F-AFA7-48BA-8762-5569EC174AEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:itanium:*:*:*:*:*", "matchCriteriaId": "59F8A83B-899C-47CE-B444-E8B4AC7723C7", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x32:*:*:*:*:*", "matchCriteriaId": "7AF8B188-A5E0-4D53-9FE1-C72BD956191B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*", "matchCriteriaId": "2B89E436-C99E-4F68-AADD-E5980B346E95", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:directx:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A53A6AC-74B0-4DB3-B94D-06FB969AE83C", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the \"MJPEG Decoder Vulnerability.\"" }, { "lang": "es", "value": "Microsoft DirectX 8.1 a 9.0c, y DirectX en Microsoft XP SP2 y SP3, Server 2003 SP1 y SP2, Vista Gold y SP1, y Server 2008 no realiza adecuadamente la comprobaci\u00f3n de errores MJPEG lo cual podr\u00eda permitir a usuarios remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una cadena de datos MJPEG manipulada en un archivo (1) AVI o (2) ASF, tambi\u00e9n conocida como la \"Vulnerabilidad del decodificador MJPEG\"" } ], "id": "CVE-2008-0011", "lastModified": "2024-11-21T00:40:58.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-06-12T02:32:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/30579" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1020222" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/29581" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1780" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/30579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1020222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/29581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5236" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:datacenter_server:*:*:*:*:*:*:*", "matchCriteriaId": "4D3249AF-05B0-4C34-BFBB-56B028806920", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:datacenter_server:sp1:*:*:*:*:*:*", "matchCriteriaId": "ED93DC7D-4A15-4D31-8509-07EDFD2F2907", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:datacenter_server:sp2:*:*:*:*:*:*", "matchCriteriaId": "E7FF5726-8AEC-43D9-834E-554326851007", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:datacenter_server:sp3:*:*:*:*:*:*", "matchCriteriaId": "2F0D9B07-41F4-4B04-9CFB-11D8AE8346CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:datacenter_server:sp4:*:*:*:*:*:*", "matchCriteriaId": "A35E805B-ACED-4999-B365-2EAEA7BDBCE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp2:home:*:*:*:*:*", "matchCriteriaId": "5C974913-1C52-48FD-8C50-E1BD1484DD81", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp_tablet_pc:*:*:*:*:*:*:*", "matchCriteriaId": "1EA18974-CD68-44C2-84A7-7C43CE392A57", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp_tablet_pc:sp1:*:*:*:*:*:*", "matchCriteriaId": "2C8B72F9-B944-4192-B1B9-2157B2824D84", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp_tablet_pc:sp2:*:*:*:*:*:*", "matchCriteriaId": "02F34464-B0E5-4D03-B5BD-79B46B8671A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:pro:*:*:*:*:*", "matchCriteriaId": "13FBAE6F-2EFF-447F-8392-ECB0FADD51D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:pro:*:*:*:*:*", "matchCriteriaId": "99970D48-98C0-44B4-803A-64D8A82E6823", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp3:pro:*:*:*:*:*", "matchCriteriaId": "C805DC16-8660-4A9C-84A5-ADD108DA0509", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:pro:*:*:*:*:*", "matchCriteriaId": "C6C99A6D-BE32-4634-9261-81E26983FB84", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_advanced_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "66C83CA0-6BF9-4A9B-9078-ED0FEBE106A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_advanced_server:sp1:*:*:*:*:*:*:*", "matchCriteriaId": "F75E7A74-DA7D-49D8-AF65-A96496F28542", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_advanced_server:sp2:*:*:*:*:*:*:*", "matchCriteriaId": "FD2C8535-5107-4772-AF13-EBC710C9254A", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_advanced_server:sp3:*:*:*:*:*:*:*", "matchCriteriaId": "1392664E-9EBF-4009-9DC6-4A1327B5C77E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_advanced_server:sp4:*:*:*:*:*:*:*", "matchCriteriaId": "7FEE2351-7780-4276-8259-F8B51A9057BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*", "matchCriteriaId": "480D8321-EB2F-4626-A16B-F3C2B771EDB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:*:*:*:*:*:*:*", "matchCriteriaId": "3F633513-6E9A-4F2D-964A-6AFDE5307AD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:*:*:*:*:*:*:*", "matchCriteriaId": "0095FE21-F45F-4D50-A22B-6AEF5ED4D691", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:*:*:*:*:*:*:*", "matchCriteriaId": "F3AF27C8-C2FA-477D-8332-B96277530B4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*", "matchCriteriaId": "709E6DA0-09F8-4EAB-B1B2-D4D0A7771AC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC387D-BB23-4EB9-A7DA-6E3F5CD8EFD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:web_edition:*:*:*:*:*:*:*", "matchCriteriaId": "E296F83E-39E1-4DA0-A410-DDD17BDB3939", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2000:none:*:*:*:*:*:*:*", "matchCriteriaId": "31C01123-902E-4D3E-A752-30468074C859", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2000:sp1:*:*:*:*:*:*:*", "matchCriteriaId": "484FF31A-2A02-4178-BBBD-9122823C6555", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2000:sp2:*:*:*:*:*:*:*", "matchCriteriaId": "7E6E14CB-0248-483C-BCBB-490CF016B04B", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2000:sp3:*:*:*:*:*:*:*", "matchCriteriaId": "EC091471-7FC0-4FA0-89DB-AEA9B600C631", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:datacenter_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "09A3A431-9CB0-45F6-8E9E-84A445B117B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:enterprise_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "31390E94-0808-490A-B539-E46786CBC2CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:standard_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "98B4B063-005F-4429-8CF9-402E24A7E420", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:web_edition_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "E83E3F8C-E5C0-4616-81B7-9BFE4555B597", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*", "matchCriteriaId": "403945FA-8676-4D98-B903-48452B46F48F", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:pro:*:*:*:*:*", "matchCriteriaId": "19DA594E-B495-4C5D-BC94-79582D3983C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*", "matchCriteriaId": "ACF75FC8-095A-4EEA-9A41-C27CFF3953FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", "matchCriteriaId": "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*", "matchCriteriaId": "6A05337E-18A5-4939-85A0-69583D9B5AD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:pro:*:*:*:*:*", "matchCriteriaId": "E78E8FC4-9D64-4ADC-B318-55F4337B7EEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*", "matchCriteriaId": "7E439FA5-78BF-41B1-BAEC-C1C94CE86F2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:pro:*:*:*:*:*", "matchCriteriaId": "261215DA-7018-4CE5-B055-0935DF9089A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute." } ], "id": "CVE-2006-0005", "lastModified": "2024-11-21T00:05:26.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-02-14T19:06:00.000", "references": [ { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18852" }, { "source": "secure@microsoft.com", "url": "http://securitytracker.com/id?1015628" }, { "source": "secure@microsoft.com", "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=393" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/692060" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/bid/16644" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-045A.html" }, { "source": "secure@microsoft.com", "url": "http://www.vupen.com/english/advisories/2006/0575" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-006" }, { "source": "secure@microsoft.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24493" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015628" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/692060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-045A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1559" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | vista | |
microsoft | windows_vista | * | |
realtek | hd_audio_codec_drivers | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:*:x32:*:*:*:*:*", "matchCriteriaId": "8C7E0F58-4948-4785-816F-6B2DC5FEA18E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:realtek:hd_audio_codec_drivers:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B3CDE37-6440-4047-81C5-8E398373EEF6", "versionEndIncluding": "6.0.1.5604", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allows local users to execute arbitrary code via a crafted IOCTL request." }, { "lang": "es", "value": "Desbordamiento de entero en los controladores RTKVHDA.sys y RTKVHDA64.sys del Codec de audio Realtek HD anterior a la version 6.0.1.5605 en Windows Vista permite a usuarios locales ejecutar c\u00f3digo arbitrario mediante la creaci\u00f3n de respuestas IOCTL manipuladas." } ], "id": "CVE-2008-1932", "lastModified": "2024-11-21T00:45:41.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-25T06:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29953" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/491249/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28909" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1350/references" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.wintercore.com/advisories/advisory_W010408.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/491249/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1350/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.wintercore.com/advisories/advisory_W010408.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42079" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | digital_image_suite | 2006 | |
microsoft | forefront_client_security | 1.0 | |
microsoft | internet_explorer | 6 | |
microsoft | office | 2003 | |
microsoft | office | 2003 | |
microsoft | office | xp | |
microsoft | office_powerpoint_viewer | 2003 | |
microsoft | report_viewer | 2005 | |
microsoft | report_viewer | 2008 | |
microsoft | server | 2008 | |
microsoft | sql_server | 2005 | |
microsoft | sql_server_reporting_services | 2000 | |
microsoft | visio | 2002 | |
microsoft | works | 8.0 | |
microsoft | office_system | * | |
microsoft | office_system | * | |
microsoft | windows | 2003_server | |
microsoft | windows | 2003_server | |
microsoft | windows-nt | vista | |
microsoft | windows-nt | xp | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:digital_image_suite:2006:*:*:*:*:*:*:*", "matchCriteriaId": "24F42695-7FB7-4C43-A9A7-8A234B6E5937", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:forefront_client_security:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "578221F3-4C20-4A3F-A286-5A4680E8785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "matchCriteriaId": "D47247A3-7CD7-4D67-9D9B-A94A504DA1BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "matchCriteriaId": "07D3F3E4-93FB-481A-94D9-075E726697C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office_powerpoint_viewer:2003:*:*:*:*:*:*:*", "matchCriteriaId": "A5440EF5-462B-4BAC-AF60-44C5D649D0D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:report_viewer:2005:sp1:*:*:*:*:*:*", "matchCriteriaId": "033138E1-82C7-443C-89C1-23D8032674CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:report_viewer:2008:*:*:*:*:*:*:*", "matchCriteriaId": "30E84216-227B-4074-B65B-6AA399D4A8DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*", "matchCriteriaId": "FAE680C6-F940-4095-BDD5-05CBD8DA14DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:*:*", "matchCriteriaId": "26423C70-4475-4D7E-8CC0-D8CFADE16B26", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:sql_server_reporting_services:2000:sp2:*:*:*:*:*:*", "matchCriteriaId": "377777D4-0649-4732-9E38-E4074056C561", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*", "matchCriteriaId": "D0D2C5C3-225C-49DC-B9C7-C5BC05900F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "293914AF-6101-4F50-9560-A4EA99D767C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:office_system:*:gold:*:*:*:*:*:*", "matchCriteriaId": "D08AE69C-A8E4-4291-AE45-C311BA8168D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:office_system:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "9E27318C-A079-40D4-8994-96C6809CA1FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*", "matchCriteriaId": "CFC4CDAF-F0C4-4B7D-9692-5E73C489F5A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows:2003_server:sp2:*:*:*:*:*:*", "matchCriteriaId": "6265A492-BDB8-4A41-A5D1-9947C8EF002E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:*:gold:*:*:*:*:*", "matchCriteriaId": "85442DDD-DFB0-455D-8078-EFE49ABC60B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka \"GDI+ EMF Memory Corruption Vulnerability.\"" }, { "lang": "es", "value": "gdiplus.dll en GDI+ de Microsoft Internet Explorer 6 SP1, Windows XP SP2 y SP3, Server 2003 SP1 y SP2, Vista Gold y SP1, Server 2008, Office XP SP3, Office 2003 SP2 y SP3, 2007 Microsoft Office System Gold y SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 y 2008 y Forefront Client Security 1.0 no realiza correctamente la asignaci\u00f3n de memoria, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un archivo de imagen EMF mal formado, tambi\u00e9n conocido como \"GDI+ EMF Memory Corruption Vulnerability (Vulnerabilidad de Corrupci\u00f3n de Memoria GDI+EMF)\"." } ], "id": "CVE-2008-3012", "lastModified": "2024-11-21T00:48:13.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-09-11T01:11:47.087", "references": [ { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "secure@microsoft.com", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "secure@microsoft.com", "url": "http://secunia.com/advisories/32154" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/bid/31019" }, { "source": "secure@microsoft.com", "url": "http://www.securitytracker.com/id?1020835" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "source": "secure@microsoft.com", "url": "http://www.vupen.com/english/advisories/2008/2520" }, { "source": "secure@microsoft.com", "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6040" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows_2000 | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_vista | * | |
microsoft | windows_xp | * | |
microsoft | windows_xp | * | |
microsoft | windows_xp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:itanium:*:*:*:*:*", "matchCriteriaId": "59F8A83B-899C-47CE-B444-E8B4AC7723C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x32:*:*:*:*:*", "matchCriteriaId": "7AF8B188-A5E0-4D53-9FE1-C72BD956191B", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*", "matchCriteriaId": "2B89E436-C99E-4F68-AADD-E5980B346E95", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*", "matchCriteriaId": "CD264C73-360E-414D-BE22-192F92E5A0A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "FE8F4276-4D97-480D-A542-FE9982FFD765", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:itanium:*:*:*:*:*", "matchCriteriaId": "972ADDBC-5D6E-48D5-9DB7-44FE0539807D", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "matchCriteriaId": "F7EFB032-47F4-4497-B16B-CB9126EAC9DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "6881476D-81A2-4DFD-AC77-82A8D08A0568", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*", "matchCriteriaId": "ACF75FC8-095A-4EEA-9A41-C27CFF3953FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF image file with crafted filename parameters, aka \"GDI Stack Overflow Vulnerability.\"" }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en GDI de Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 y SP2, Vista, y Server 2008, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero de imagen EMF con los par\u00e1metros del nombre del fichero manipulados, tambi\u00e9n conocido como \"Vulnerabilidad de desbordamiento de pila en GDI\"" } ], "id": "CVE-2008-1087", "lastModified": "2024-11-21T00:43:38.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-04-08T23:05:00.000", "references": [ { "source": "secure@microsoft.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29704" }, { "source": "secure@microsoft.com", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/44215" }, { "source": "secure@microsoft.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28570" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1019798" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "source": "secure@microsoft.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1145/references" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5580" }, { "source": "secure@microsoft.com", "url": "https://www.exploit-db.com/exploits/5442" }, { "source": "secure@microsoft.com", "url": "https://www.exploit-db.com/exploits/6656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/44215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1019798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1145/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6656" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
apple | quicktime | * | |
apple | quicktime | 7.0 | |
apple | quicktime | 7.0.1 | |
apple | quicktime | 7.0.2 | |
apple | quicktime | 7.0.3 | |
apple | quicktime | 7.0.4 | |
apple | quicktime | 7.1 | |
apple | quicktime | 7.1.1 | |
apple | quicktime | 7.1.2 | |
apple | quicktime | 7.1.3 | |
apple | quicktime | 7.1.4 | |
apple | quicktime | 7.1.5 | |
apple | quicktime | 7.1.6 | |
apple | quicktime | 7.2 | |
apple | quicktime | 7.3 | |
apple | quicktime | 7.3.1 | |
apple | quicktime | 7.3.1.70 | |
apple | quicktime | 7.4 | |
apple | quicktime | 7.4.1 | |
apple | quicktime | 7.4.5 | |
apple | mac_os_x | 10.3.9 | |
apple | mac_os_x | 10.4.9 | |
apple | mac_os_x | 10.4.10 | |
apple | mac_os_x | 10.4.11 | |
apple | mac_os_x | 10.5 | |
apple | mac_os_x | 10.5.1 | |
apple | mac_os_x | 10.5.2 | |
apple | mac_os_x | 10.5.3 | |
apple | mac_os_x | 10.5.4 | |
apple | mac_os_x_server | 10.3.9 | |
apple | mac_os_x_server | 10.4.9 | |
apple | mac_os_x_server | 10.4.10 | |
apple | mac_os_x_server | 10.4.11 | |
apple | mac_os_x_server | 10.5 | |
microsoft | windows-nt | xp | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "matchCriteriaId": "70DDAE09-0183-4BF4-8053-D80E6AE9F1C2", "versionEndIncluding": "7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F075BA0F-4A96-4F25-AF1D-C64C7DCE1CDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8692B488-129A-49EA-AF84-6077FCDBB898", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1758610B-3789-489E-A751-386D605E5A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B535737C-BF32-471C-B26A-588632FCC427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF2C61F8-B376-40F9-8677-CADCC3295915", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "6254BB56-5A25-49DC-A851-3CCA249BD71D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "795E3354-7824-4EF4-A788-3CFEB75734E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9419A1E9-A0DA-4846-8959-BE50B53736E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "952A8015-B18B-481C-AC17-60F0D7EEE085", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E518B27-A79B-43A4-AFA6-E59EF8E944D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AEC6EF36-93B3-49BB-9A6F-1990E3F4170E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1A1B5F2F-CDBF-4AEF-9F78-0C010664B9E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "98C9B657-5484-4458-861E-D6FB5019265A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "1EF20D38-BFA3-4403-AB24-7B74EFD68229", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2CE2A89-B2FC-413D-A059-526E6DE301BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*", "matchCriteriaId": "7F9F7DCE-EE65-4CD5-AA21-208B2AAF09EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "31662D02-7FA9-4FAD-BE49-194B7295CEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8461AF0A-D4D3-4010-A881-EDBB95003083", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "5C8E5C77-573F-4EA3-A59C-4A7B11946E93", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "8D089858-3AF9-4B82-912D-AA33F25E3715", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "D2442D35-7484-43D8-9077-3FDF63104816", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3F3E721C-00CA-4D51-B542-F2BC5C0D65BF", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3267A41-1AE0-48B8-BD1F-DEC8A212851A", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "855288F1-0242-4951-AB3F-B7AF13E21CF6", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "10082781-B93E-4B84-94F2-FA9749B4D92B", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "8923EE1A-DD48-4EC8-8698-A33093FD709C", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "3029892E-1375-4F40-83D3-A51BDC4E9840", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "81F8DA6D-2258-4138-8FB2-90BE3C68B230", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D09D5933-A7D9-4A61-B863-CD8E7D5E67D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "20E8648C-5469-4280-A581-D4A9A41B7213", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apple QuickTime before 7.5.5 allows remote attackers to cause a denial of service (application crash) via a crafted PICT image that triggers an out-of-bounds read." }, { "lang": "es", "value": "Apple QuickTime anterior a 7.5.5 , permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n), a trav\u00e9s de una imagen PICT manipulada que induce una lectura fuera de rango." } ], "id": "CVE-2008-3629", "lastModified": "2024-11-21T00:49:43.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-09-11T01:13:09.897", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31821" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/32121" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1020841" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3027" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3189" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31086" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31548" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2735" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1020841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16019" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows_2000 | * | |
microsoft | internet_explorer | 5.01 | |
microsoft | internet_explorer | 6 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_vista | * | |
microsoft | windows_xp | * | |
microsoft | windows_xp | * | |
microsoft | windows_xp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*", "matchCriteriaId": "F3F2A51E-2675-4993-B9C2-F2D176A92857", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "matchCriteriaId": "D47247A3-7CD7-4D67-9D9B-A94A504DA1BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:itanium:*:*:*:*:*", "matchCriteriaId": "59F8A83B-899C-47CE-B444-E8B4AC7723C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x32:*:*:*:*:*", "matchCriteriaId": "7AF8B188-A5E0-4D53-9FE1-C72BD956191B", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*", "matchCriteriaId": "2B89E436-C99E-4F68-AADD-E5980B346E95", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*", "matchCriteriaId": "CD264C73-360E-414D-BE22-192F92E5A0A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "FE8F4276-4D97-480D-A542-FE9982FFD765", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:itanium:*:*:*:*:*", "matchCriteriaId": "972ADDBC-5D6E-48D5-9DB7-44FE0539807D", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "matchCriteriaId": "F7EFB032-47F4-4497-B16B-CB9126EAC9DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "6881476D-81A2-4DFD-AC77-82A8D08A0568", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*", "matchCriteriaId": "ACF75FC8-095A-4EEA-9A41-C27CFF3953FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HxTocCtrl ActiveX control (hxvz.dll), as used in Microsoft Internet Explorer 5.01 SP4 and 6 SP1, in Windows XP SP2, Server 2003 SP1 and SP2, Vista SP1, and Server 2008, allows remote attackers to execute arbitrary code via malformed arguments, which triggers memory corruption." }, { "lang": "es", "value": "El HxTocCtrl ActiveX control (hxvz.dll), usado en Microsoft Internet Explorer 5.01 SP4 y 6 SP1, en Windows XP SP2, Server 2003 SP1 y SP2, Vista SP1 y Server 2008, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos mal formados, lo que dispara una corrupci\u00f3n de memoria." } ], "id": "CVE-2008-1086", "lastModified": "2024-11-21T00:43:38.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-04-08T23:05:00.000", "references": [ { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=680" }, { "source": "secure@microsoft.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29714" }, { "source": "secure@microsoft.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28606" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1019800" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "source": "secure@microsoft.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1147/references" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-023" }, { "source": "secure@microsoft.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41464" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29714" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1019800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1147/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5475" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
apple | bonjour | 1.0.4 | |
microsoft | windows-nt | xp | |
microsoft | windows_2000 | - | |
microsoft | windows_2003_server | - | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:bonjour:1.0.4:unknown:windows:*:*:*:*:*", "matchCriteriaId": "1ACABF55-DE3F-463A-A469-A76589C3AAB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAA86830-BEA8-4943-83EA-C267FA534223", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mDNSResponder in the Bonjour Namespace Provider in Apple Bonjour for Windows before 1.0.5 allows attackers to cause a denial of service (NULL pointer dereference and application crash) by resolving a crafted .local domain name that contains a long label." }, { "lang": "es", "value": "mDNSResponder de Bonjour Namespace Provider \r\nen Apple Bonjour para Windows versiones anteriores a la 1.0.5, permite a atacantes provocar una denegaci\u00f3n de servicio (puntero NULO sin referencia y ca\u00edda de aplicaci\u00f3n) resolviendo un nombre de dominio .local manipulado que contiene una etiqueta larga.\u00f1" } ], "id": "CVE-2008-2326", "lastModified": "2024-11-21T00:46:37.383", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-09-11T01:10:25.367", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31822" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT2990" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/31091" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020845" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2524" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45005" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT2990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/31091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45005" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | vista | |
microsoft | windows-nt | xp | |
microsoft | windows_2000 | * | |
microsoft | windows_vista | * | |
microsoft | windows_xp | * | |
panda | panda_antivirus_and_firewall | 2008 | |
panda | panda_internet_security | 2008 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:*:x32:*:*:*:*:*", "matchCriteriaId": "8C7E0F58-4948-4785-816F-6B2DC5FEA18E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:*:x32:*:*:*:*:*", "matchCriteriaId": "EEC92A11-2DA9-45B0-8887-876126DA6940", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:pro:*:*:*:*:*", "matchCriteriaId": "26CF0F23-E9B6-415F-868A-C883EF11F389", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*", "matchCriteriaId": "ACF75FC8-095A-4EEA-9A41-C27CFF3953FB", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:panda:panda_antivirus_and_firewall:2008:*:*:*:*:*:*:*", "matchCriteriaId": "C4D1D99A-22AA-4FC6-ADEF-2759EB96CF5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:panda:panda_internet_security:2008:*:*:*:*:*:*:*", "matchCriteriaId": "045DD35A-DBE0-412F-AEE0-CA333328A59D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The cpoint.sys driver in Panda Internet Security 2008 and Antivirus+ Firewall 2008 allows local users to cause a denial of service (system crash or kernel panic), overwrite memory, or execute arbitrary code via a crafted IOCTL request that triggers an out-of-bounds write of kernel memory." }, { "lang": "es", "value": "El dispositivo cpoint.sys driver en Panda Internet Security 2008 y Antivirus+ Firewall 2008 permite a usuarios locales provocar una denegaci\u00f3n de servicio (ca\u00edda del sistema o kernel panic), sobrescribir memoria o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una petici\u00f3n IOCTL manipulada que dispara una escritura en memoria fuera de l\u00edmite." } ], "id": "CVE-2008-1471", "lastModified": "2024-11-21T00:44:37.097", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-24T22:44:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29311" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.pandasecurity.com/homeusers/support/card?id=41231\u0026idIdioma=2\u0026ref=ProdExp" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.pandasecurity.com/homeusers/support/card?id=41337\u0026idIdioma=2\u0026ref=ProdExp" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489292/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28150" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019568" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.trapkit.de/advisories/TKADV2008-001.txt" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0801/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.pandasecurity.com/homeusers/support/card?id=41231\u0026idIdioma=2\u0026ref=ProdExp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.pandasecurity.com/homeusers/support/card?id=41337\u0026idIdioma=2\u0026ref=ProdExp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489292/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.trapkit.de/advisories/TKADV2008-001.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0801/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41079" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows_media_encoder | 9_series | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | xp | |
microsoft | windows_2000 | - | |
microsoft | windows_2003_server | - | |
microsoft | windows_2003_server | - | |
microsoft | windows_2003_server | - | |
microsoft | windows_2003_server | - | |
microsoft | windows_xp | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:windows_media_encoder:9_series:*:*:*:*:*:*:*", "matchCriteriaId": "8494DA8E-2E88-46FE-9FE1-A09DF53BF1FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*", "matchCriteriaId": "2B89E436-C99E-4F68-AADD-E5980B346E95", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*", "matchCriteriaId": "CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:-:*:x64:*:*:*:*:*", "matchCriteriaId": "FDDFEA49-9B44-498E-B2DB-E1FC778DE7EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "2A0607E7-B416-4AF8-ADF6-6E503627DD29", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "3C0C7D2B-0AA5-4E82-B58B-2668A0EAC2E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*", "matchCriteriaId": "4D5F7729-A095-43DF-BF2F-B4B6938087FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", "matchCriteriaId": "FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka \"Windows Media Encoder Buffer Overrun Vulnerability.\"" }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el control WMEncProfileManager ActiveX en wmex.dll en Microsoft Windows Media Encoder 9 Series permite a atacantes remotos ejecutar un c\u00f3digo arbitrario a trav\u00e9s de un primer argumento largo en el m\u00e9todo GetDetailsString, tambi\u00e9n conocido como \"Windows Media Encoder Buffer Overrun Vulnerability\"." } ], "id": "CVE-2008-3008", "lastModified": "2024-11-21T00:48:13.287", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-09-11T01:11:47.057", "references": [ { "source": "secure@microsoft.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/996227" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31065" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1020832" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "source": "secure@microsoft.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/2521" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6018" }, { "source": "secure@microsoft.com", "url": "https://www.exploit-db.com/exploits/6454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/996227" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1020832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/2521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6454" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:gold:server_x64:*:*:*:*:*", "matchCriteriaId": "6B0F7775-1068-4A05-91FC-E1F6634F855A", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server:*:*:*:*:*", "matchCriteriaId": "9B437168-290C-460E-AF10-BB373054856B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server_itanium:*:*:*:*:*", "matchCriteriaId": "9929BFAC-3FFC-4836-B8D5-2947BC6B496E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server:*:*:*:*:*", "matchCriteriaId": "D76A280A-3E99-4A58-94D7-F92F8A9414D2", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_itanium:*:*:*:*:*", "matchCriteriaId": "1BCA8432-4F15-40FB-AC89-8F26AE1EFE32", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_x64:*:*:*:*:*", "matchCriteriaId": "F538C690-E6B0-4F50-9306-28FA55B4F8EB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:gold:media_center_2005:*:*:*:*:*", "matchCriteriaId": "1D07E13E-659F-480C-B8BA-F62D4B9B5234", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:gold:tablet_pc_2005:*:*:*:*:*", "matchCriteriaId": "59E405A0-8A83-4003-9398-4DDCB28BBAAA", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:gold:x64:*:*:*:*:*", "matchCriteriaId": "55F983ED-1270-4CF5-8DD1-006899EAE892", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:1.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "B4B659D4-6EDD-4A31-A7CC-70B12EBEB4D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:gold:server_x64:*:*:*:*:*", "matchCriteriaId": "6B0F7775-1068-4A05-91FC-E1F6634F855A", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server:*:*:*:*:*", "matchCriteriaId": "9B437168-290C-460E-AF10-BB373054856B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server_itanium:*:*:*:*:*", "matchCriteriaId": "9929BFAC-3FFC-4836-B8D5-2947BC6B496E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server:*:*:*:*:*", "matchCriteriaId": "D76A280A-3E99-4A58-94D7-F92F8A9414D2", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_itanium:*:*:*:*:*", "matchCriteriaId": "1BCA8432-4F15-40FB-AC89-8F26AE1EFE32", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_x64:*:*:*:*:*", "matchCriteriaId": "F538C690-E6B0-4F50-9306-28FA55B4F8EB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:itanium:*:*:*:*:*", "matchCriteriaId": "59F8A83B-899C-47CE-B444-E8B4AC7723C7", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*", "matchCriteriaId": "2B89E436-C99E-4F68-AADD-E5980B346E95", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:sp1:x64:*:*:*:*:*", "matchCriteriaId": "C52FFD3E-195E-4A61-9789-AF5A3EFB3A62", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:gold:x64:*:*:*:*:*", "matchCriteriaId": "55F983ED-1270-4CF5-8DD1-006899EAE892", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*", "matchCriteriaId": "F9DC56EB-EDC4-4DFE-BA9B-B17FF4A91734", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "0BF6AE15-EAC3-4100-A742-211026C79CCC", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:gold:server_x64:*:*:*:*:*", "matchCriteriaId": "6B0F7775-1068-4A05-91FC-E1F6634F855A", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server:*:*:*:*:*", "matchCriteriaId": "9B437168-290C-460E-AF10-BB373054856B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp1:server_itanium:*:*:*:*:*", "matchCriteriaId": "9929BFAC-3FFC-4836-B8D5-2947BC6B496E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server:*:*:*:*:*", "matchCriteriaId": "D76A280A-3E99-4A58-94D7-F92F8A9414D2", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_itanium:*:*:*:*:*", "matchCriteriaId": "1BCA8432-4F15-40FB-AC89-8F26AE1EFE32", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2003:sp2:server_x64:*:*:*:*:*", "matchCriteriaId": "F538C690-E6B0-4F50-9306-28FA55B4F8EB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:gold:x64:*:*:*:*:*", "matchCriteriaId": "55F983ED-1270-4CF5-8DD1-006899EAE892", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*", "matchCriteriaId": "F9DC56EB-EDC4-4DFE-BA9B-B17FF4A91734", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A419F50E-F32C-461C-95D0-978C5351FBAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework with the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a \"\u003c~/\" (less-than tilde slash) sequence followed by a crafted STYLE element." }, { "lang": "es", "value": "Request Validation (tambien conocida como filtros ValidateRequest) en ASP.NET de Microsoft .NET Framework con la actualizaci\u00f3n MS07-040, no detecta de forma adecuada las entradas peligrosas de clientes, lo que permite a atacantes, conducir ataques de secuencias de comandos en sitios cruzados (XSS) como se demostr\u00f3 mediante una petici\u00f3n que conten\u00eda la cadena \"\u003c~/\" (menor que, tilde y barra) seguida de un elemento STYLE manipulado." } ], "id": "CVE-2008-3843", "lastModified": "2024-11-21T00:50:15.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-08-27T20:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4193" }, { "source": "cve@mitre.org", "url": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf" }, { "source": "cve@mitre.org", "url": "http://www.procheckup.com/Vulnerability_PR08-20.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/495667/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/496071/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.procheckup.com/Vulnerability_PR08-20.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/495667/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/496071/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44743" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | xp | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_xp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x32:*:*:*:*:*", "matchCriteriaId": "7AF8B188-A5E0-4D53-9FE1-C72BD956191B", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*", "matchCriteriaId": "2B89E436-C99E-4F68-AADD-E5980B346E95", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:pro:*:*:*:*:*", "matchCriteriaId": "EFE32C06-74E0-4C0D-8C12-B20282AB9F7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*", "matchCriteriaId": "CD264C73-360E-414D-BE22-192F92E5A0A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "FE8F4276-4D97-480D-A542-FE9982FFD765", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:itanium:*:*:*:*:*", "matchCriteriaId": "972ADDBC-5D6E-48D5-9DB7-44FE0539807D", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "matchCriteriaId": "F7EFB032-47F4-4497-B16B-CB9126EAC9DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "6881476D-81A2-4DFD-AC77-82A8D08A0568", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Active Directory on Microsoft Windows 2000 Server SP4, XP Professional SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to cause a denial of service (system hang or reboot) via a crafted LDAP request." }, { "lang": "es", "value": "Active Directory en Microsoft Windows 2000 Server SP4, XP Professional SP2 y SP3, Server 2003 SP1 y SP2, y Server 2008 permite a usuarios autenticados causar una denegaci\u00f3n de servicio (ca\u00edda del sistema o reinicio) a trav\u00e9s de una petici\u00f3n LDAP manipulada." } ], "id": "CVE-2008-1445", "lastModified": "2024-11-21T00:44:32.470", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-06-12T02:32:00.000", "references": [ { "source": "secure@microsoft.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "http://secunia.com/advisories/30586" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1020229" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/archive/1/493338/100/0/threaded" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/archive/1/493342/100/0/threaded" }, { "source": "secure@microsoft.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/29584" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "source": "secure@microsoft.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1782" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "http://secunia.com/advisories/30586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1020229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/493338/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/493342/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/29584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4910" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | 2008 | |
microsoft | windows_vista | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*", "matchCriteriaId": "ABC3CA16-2694-4C05-A404-029DB179C47D", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Explorer in Microsoft Windows Vista up to SP1, and Server 2008, allows user-assisted remote attackers to execute arbitrary code via crafted saved-search (.search-ms) files that are not properly handled when saving, aka \"Windows Saved Search Vulnerability.\"" }, { "lang": "es", "value": "El Explorador de Windows en Microsoft Windows Vista hasta SP1 y Server 2008, permite a atacantes remotos con la ayuda del usuario ejecutar c\u00f3digo de su elecci\u00f3n mediante ficheros manipulados de guardar-b\u00fasqueda (.search-ms) que no se han manejado adecuadamente cuando se guardaban. Tambi\u00e9n se conoce como \"Vulnerabilidad de Guardar B\u00fasqueda de Windows\"" } ], "id": "CVE-2008-1435", "lastModified": "2024-11-21T00:44:31.503", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-07-08T23:41:00.000", "references": [ { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30953" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/bid/30109" }, { "source": "secure@microsoft.com", "url": "http://www.securitytracker.com/id?1020436" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html" }, { "source": "secure@microsoft.com", "url": "http://www.vupen.com/english/advisories/2008/2020/references" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2020/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5600" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | xp | |
microsoft | windows_2000 | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_xp | * | |
microsoft | windows_xp | * | |
microsoft | windows_xp | * | |
microsoft | directx | 9.0 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows-nt | 2008 | |
microsoft | windows_vista | * | |
microsoft | directx | 10.0 | |
microsoft | windows_2000 | * | |
microsoft | directx | 7.0 | |
microsoft | directx | 8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*", "matchCriteriaId": "CD264C73-360E-414D-BE22-192F92E5A0A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "FE8F4276-4D97-480D-A542-FE9982FFD765", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:itanium:*:*:*:*:*", "matchCriteriaId": "972ADDBC-5D6E-48D5-9DB7-44FE0539807D", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "matchCriteriaId": "F7EFB032-47F4-4497-B16B-CB9126EAC9DF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "6881476D-81A2-4DFD-AC77-82A8D08A0568", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*", "matchCriteriaId": "ACF75FC8-095A-4EEA-9A41-C27CFF3953FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "57ECAAA8-8709-4AC7-9CE7-49A8040C04D3", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:directx:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2936E9C2-65E6-4D26-A277-FF2AE13A3FEC", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:itanium:*:*:*:*:*", "matchCriteriaId": "59F8A83B-899C-47CE-B444-E8B4AC7723C7", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x32:*:*:*:*:*", "matchCriteriaId": "7AF8B188-A5E0-4D53-9FE1-C72BD956191B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*", "matchCriteriaId": "2B89E436-C99E-4F68-AADD-E5980B346E95", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:directx:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A53A6AC-74B0-4DB3-B94D-06FB969AE83C", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:directx:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "2BFE77B9-6C2A-45D3-A4B5-2679CC4B0DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:directx:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "8FF0278F-AFA7-48BA-8762-5569EC174AEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a Synchronized Accessible Media Interchange (SAMI) file with crafted parameters for a Class Name variable, aka the \"SAMI Format Parsing Vulnerability.\"" }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en Microsoft DirectX 7.0 y 8.1 o en Windows 2000 SP4 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo Synchronized Accessible Media Interchange (SAMI) con par\u00e1metros manipulados para una variable Class Name, tambi\u00e9n conocida como la \"Vulnerabilidad SAMI Format Parsing\"" } ], "id": "CVE-2008-1444", "lastModified": "2024-11-21T00:44:32.347", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-06-12T02:32:00.000", "references": [ { "source": "secure@microsoft.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/30579" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3937" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1020223" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/archive/1/493250/100/0/threaded" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/29578" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "source": "secure@microsoft.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1780" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-040/" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/30579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1020223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/493250/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/29578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-040/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5562" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
apple | quicktime | * | |
apple | quicktime | 7.0 | |
apple | quicktime | 7.0.1 | |
apple | quicktime | 7.0.2 | |
apple | quicktime | 7.0.3 | |
apple | quicktime | 7.0.4 | |
apple | quicktime | 7.1 | |
apple | quicktime | 7.1.1 | |
apple | quicktime | 7.1.2 | |
apple | quicktime | 7.1.3 | |
apple | quicktime | 7.1.4 | |
apple | quicktime | 7.1.5 | |
apple | quicktime | 7.1.6 | |
apple | quicktime | 7.2 | |
apple | quicktime | 7.3 | |
apple | quicktime | 7.3.1 | |
apple | quicktime | 7.3.1.70 | |
apple | quicktime | 7.4 | |
apple | quicktime | 7.4.1 | |
apple | quicktime | 7.4.5 | |
intel | indeo | 3.2 | |
microsoft | windows-nt | xp | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "matchCriteriaId": "70DDAE09-0183-4BF4-8053-D80E6AE9F1C2", "versionEndIncluding": "7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F075BA0F-4A96-4F25-AF1D-C64C7DCE1CDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8692B488-129A-49EA-AF84-6077FCDBB898", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1758610B-3789-489E-A751-386D605E5A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B535737C-BF32-471C-B26A-588632FCC427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF2C61F8-B376-40F9-8677-CADCC3295915", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "6254BB56-5A25-49DC-A851-3CCA249BD71D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "795E3354-7824-4EF4-A788-3CFEB75734E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9419A1E9-A0DA-4846-8959-BE50B53736E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "952A8015-B18B-481C-AC17-60F0D7EEE085", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E518B27-A79B-43A4-AFA6-E59EF8E944D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AEC6EF36-93B3-49BB-9A6F-1990E3F4170E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1A1B5F2F-CDBF-4AEF-9F78-0C010664B9E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "98C9B657-5484-4458-861E-D6FB5019265A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "1EF20D38-BFA3-4403-AB24-7B74EFD68229", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2CE2A89-B2FC-413D-A059-526E6DE301BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*", "matchCriteriaId": "7F9F7DCE-EE65-4CD5-AA21-208B2AAF09EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "31662D02-7FA9-4FAD-BE49-194B7295CEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8461AF0A-D4D3-4010-A881-EDBB95003083", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "5C8E5C77-573F-4EA3-A59C-4A7B11946E93", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:indeo:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4591CA5A-8441-45BE-8A60-05F6EB9AC25D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "73AED29E-B778-4186-8968-EB608E34E540", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in QuickTimeInternetExtras.qtx in an unspecified third-party Indeo v3.2 (aka IV32) codec for QuickTime, when used with Apple QuickTime before 7.5.5 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en QuickTimeInternetExtras.qtx en un codec de Indeo v3.2 (tambi\u00e9n conocido como IV32) de terceros que no se ha especificado y que es para QuickTime, cuando se utiliza con Apple QuickTime anterior a 7.5.5 en Windows; permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero de pel\u00edcula manipulado." } ], "id": "CVE-2008-3635", "lastModified": "2024-11-21T00:49:44.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-09-11T01:13:09.993", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31821" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1020841" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3027" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/496201/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31086" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-057/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1020841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/496201/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-057/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows-nt | vista | |
microsoft | windows-nt | vista | |
microsoft | windows-nt | vista | |
microsoft | windows_server_2003 | * | |
microsoft | windows_server_2003 | * | |
microsoft | windows_server_2003 | * | |
microsoft | windows_server_2003 | * | |
microsoft | windows_server_2008 | * | |
microsoft | windows_server_2008 | * | |
microsoft | windows_server_2008 | * | |
microsoft | windows_vista | * | |
microsoft | windows_vista | - | |
microsoft | windows_xp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:sp1:x64:*:*:*:*:*", "matchCriteriaId": "C52FFD3E-195E-4A61-9789-AF5A3EFB3A62", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:sp2:*:*:*:*:*:*", "matchCriteriaId": "9E15E896-99D9-4558-B85E-069D2F2EA565", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows-nt:vista:sp2:x64:*:*:*:*:*", "matchCriteriaId": "0BA8CAFA-7C40-4692-A7C4-403315BF3E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*", "matchCriteriaId": "31A64C69-D182-4BEC-BA8A-7B405F5B2FC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "DA778424-6F70-4AB6-ADD5-5D4664DFE463", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*", "matchCriteriaId": "BCE2197B-7C58-4693-B9BB-0B31EABB6B66", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "matchCriteriaId": "7F6EA111-A4E6-4963-A0C8-F9336C605B6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "matchCriteriaId": "9CFB1A97-8042-4497-A45D-C014B5E240AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "matchCriteriaId": "7F9C7616-658D-409D-8B53-AC00DC55602A", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Windows XP Professional SP2, Vista, and Server 2003 and 2008 does not properly assign activities to the (1) NetworkService and (2) LocalService accounts, which might allow context-dependent attackers to gain privileges by using one service process to capture a resource from a second service process that has a LocalSystem privilege-escalation ability, related to improper management of the SeImpersonatePrivilege user right, as originally reported for Internet Information Services (IIS), aka Token Kidnapping." }, { "lang": "es", "value": "Microsoft Windows XP Professional SP2, vista y Server 2003 y 2008 no asignan apropiadamente las actividades a las cuentas (1) NetworkService y (2) LocalService, lo que podr\u00eda permitir que los atacantes dependientes del contexto consigan privilegios mediante el uso de un proceso de servicio para capturar un recurso de un segundo proceso de servicio que tiene una capacidad de escalado de privilegios LocalSystem, relacionada con la administraci\u00f3n inadecuada del derecho de usuario SeImpersonatePrivilege, como se inform\u00f3 originalmente para Internet Information Services (IIS), tambi\u00e9n se conoce como token Secuestro." } ], "id": "CVE-2008-1436", "lastModified": "2024-11-21T00:44:31.603", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-21T17:05:00.000", "references": [ { "source": "secure@microsoft.com", "url": "http://blogs.technet.com/msrc/archive/2008/04/17/msrc-blog-microsoft-security-advisory-951306.aspx" }, { "source": "secure@microsoft.com", "url": "http://isc.sans.org/diary.html?storyid=4306" }, { "source": "secure@microsoft.com", "url": "http://milw0rm.com/sploits/2008-Churrasco.zip" }, { "source": "secure@microsoft.com", "url": "http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29867" }, { "source": "secure@microsoft.com", "url": "http://securitywatch.eweek.com/flaws/microsoft_belatedly_admits_to_windows_server_2008_token_kidnapping.html" }, { "source": "secure@microsoft.com", "url": "http://www.argeniss.com/research/Churrasco.zip" }, { "source": "secure@microsoft.com", "url": "http://www.argeniss.com/research/TokenKidnapping.pdf" }, { "source": "secure@microsoft.com", "url": "http://www.microsoft.com/technet/security/advisory/951306.mspx" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/archive/1/491111/100/0/threaded" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/archive/1/497168/100/0/threaded" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/bid/28833" }, { "source": "secure@microsoft.com", "url": "http://www.securitytracker.com/id?1019904" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-104A.html" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1264/references" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1026" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012" }, { "source": "secure@microsoft.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41880" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5891" }, { "source": "secure@microsoft.com", "url": "https://www.exploit-db.com/exploits/6705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blogs.technet.com/msrc/archive/2008/04/17/msrc-blog-microsoft-security-advisory-951306.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://isc.sans.org/diary.html?storyid=4306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://milw0rm.com/sploits/2008-Churrasco.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitywatch.eweek.com/flaws/microsoft_belatedly_admits_to_windows_server_2008_token_kidnapping.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.argeniss.com/research/Churrasco.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.argeniss.com/research/TokenKidnapping.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.microsoft.com/technet/security/advisory/951306.mspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/491111/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/497168/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019904" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-104A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1264/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6705" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2008-3624
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/31086 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2008/2527 | vdb-entry, x_refsource_VUPEN | |
http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html | vendor-advisory, x_refsource_APPLE | |
http://securitytracker.com/id?1020841 | vdb-entry, x_refsource_SECTRACK | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16124 | vdb-entry, signature, x_refsource_OVAL | |
http://support.apple.com/kb/HT3027 | x_refsource_CONFIRM | |
http://secunia.com/advisories/31821 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:45:18.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31086", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "1020841", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020841" }, { "name": "oval:org.mitre.oval:def:16124", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16124" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31821" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Apple QuickTime before 7.5.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a QuickTime Virtual Reality (QTVR) movie file with crafted panorama atoms." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31086", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "1020841", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020841" }, { "name": "oval:org.mitre.oval:def:16124", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16124" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31821" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3624", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Apple QuickTime before 7.5.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a QuickTime Virtual Reality (QTVR) movie file with crafted panorama atoms." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31086", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-09-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "1020841", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020841" }, { "name": "oval:org.mitre.oval:def:16124", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16124" }, { "name": "http://support.apple.com/kb/HT3027", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31821" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3624", "datePublished": "2008-09-10T16:00:00", "dateReserved": "2008-08-12T00:00:00", "dateUpdated": "2024-08-07T09:45:18.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3842
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf | x_refsource_MISC | |
http://securityreason.com/securityalert/4193 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/495667/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44741 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:53:00.418Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf" }, { "name": "4193", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4193" }, { "name": "20080821 PR08-20: Bypassing ASP .NET \"ValidateRequest\" for Script Injection Attacks", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/495667/100/0/threaded" }, { "name": "asp-validaterequest-xss(44741)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44741" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework without the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a \"\u003c/\" (less-than slash) sequence." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf" }, { "name": "4193", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4193" }, { "name": "20080821 PR08-20: Bypassing ASP .NET \"ValidateRequest\" for Script Injection Attacks", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/495667/100/0/threaded" }, { "name": "asp-validaterequest-xss(44741)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44741" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3842", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework without the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a \"\u003c/\" (less-than slash) sequence." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf", "refsource": "MISC", "url": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf" }, { "name": "4193", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4193" }, { "name": "20080821 PR08-20: Bypassing ASP .NET \"ValidateRequest\" for Script Injection Attacks", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/495667/100/0/threaded" }, { "name": "asp-validaterequest-xss(44741)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44741" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3842", "datePublished": "2008-08-27T20:00:00", "dateReserved": "2008-08-27T00:00:00", "dateUpdated": "2024-08-07T09:53:00.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0927
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/491622/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1019836 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/29805 | third-party-advisory, x_refsource_SECUNIA | |
http://www.novell.com/support/viewContent.do?externalId=3829452&sliceId=1 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2008/1217/references | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41787 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/28757 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/5547 | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080505 Novell eDirectory DoS via HTTP headers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/491622/100/0/threaded" }, { "name": "1019836", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019836" }, { "name": "29805", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29805" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3829452\u0026sliceId=1" }, { "name": "ADV-2008-1217", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1217/references" }, { "name": "novell-edirectory-dhost-dos(41787)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41787" }, { "name": "28757", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28757" }, { "name": "5547", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5547" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-11T00:00:00", "descriptions": [ { "lang": "en", "value": "dhost.exe in Novell eDirectory 8.7.3 before sp10 and 8.8.2 allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with (1) multiple Connection headers or (2) a Connection header with multiple comma-separated values. NOTE: this might be similar to CVE-2008-1777." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20080505 Novell eDirectory DoS via HTTP headers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/491622/100/0/threaded" }, { "name": "1019836", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019836" }, { "name": "29805", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29805" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3829452\u0026sliceId=1" }, { "name": "ADV-2008-1217", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1217/references" }, { "name": "novell-edirectory-dhost-dos(41787)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41787" }, { "name": "28757", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28757" }, { "name": "5547", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5547" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0927", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dhost.exe in Novell eDirectory 8.7.3 before sp10 and 8.8.2 allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with (1) multiple Connection headers or (2) a Connection header with multiple comma-separated values. NOTE: this might be similar to CVE-2008-1777." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080505 Novell eDirectory DoS via HTTP headers", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/491622/100/0/threaded" }, { "name": "1019836", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019836" }, { "name": "29805", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29805" }, { "name": "http://www.novell.com/support/viewContent.do?externalId=3829452\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3829452\u0026sliceId=1" }, { "name": "ADV-2008-1217", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1217/references" }, { "name": "novell-edirectory-dhost-dos(41787)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41787" }, { "name": "28757", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28757" }, { "name": "5547", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5547" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0927", "datePublished": "2008-04-14T16:00:00", "dateReserved": "2008-02-25T00:00:00", "dateUpdated": "2024-08-07T08:01:40.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1435
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5600 | vdb-entry, signature, x_refsource_OVAL | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038 | vendor-advisory, x_refsource_MS | |
http://secunia.com/advisories/30953 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1020436 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2008/2020/references | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/30109 | vdb-entry, x_refsource_BID | |
http://www.us-cert.gov/cas/techalerts/TA08-190A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:24:42.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:5600", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5600" }, { "name": "MS08-038", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038" }, { "name": "30953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30953" }, { "name": "1020436", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020436" }, { "name": "ADV-2008-2020", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2020/references" }, { "name": "30109", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30109" }, { "name": "TA08-190A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Windows Explorer in Microsoft Windows Vista up to SP1, and Server 2008, allows user-assisted remote attackers to execute arbitrary code via crafted saved-search (.search-ms) files that are not properly handled when saving, aka \"Windows Saved Search Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "oval:org.mitre.oval:def:5600", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5600" }, { "name": "MS08-038", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038" }, { "name": "30953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30953" }, { "name": "1020436", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020436" }, { "name": "ADV-2008-2020", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2020/references" }, { "name": "30109", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30109" }, { "name": "TA08-190A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-1435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Windows Explorer in Microsoft Windows Vista up to SP1, and Server 2008, allows user-assisted remote attackers to execute arbitrary code via crafted saved-search (.search-ms) files that are not properly handled when saving, aka \"Windows Saved Search Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:5600", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5600" }, { "name": "MS08-038", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038" }, { "name": "30953", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30953" }, { "name": "1020436", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020436" }, { "name": "ADV-2008-2020", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2020/references" }, { "name": "30109", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30109" }, { "name": "TA08-190A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-1435", "datePublished": "2008-07-08T23:00:00", "dateReserved": "2008-03-21T00:00:00", "dateUpdated": "2024-08-07T08:24:42.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1453
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/1777 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/29522 | vdb-entry, x_refsource_BID | |
http://www.us-cert.gov/cas/techalerts/TA08-162B.html | third-party-advisory, x_refsource_CERT | |
http://securitytracker.com/id?1020221 | vdb-entry, x_refsource_SECTRACK | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-030 | vendor-advisory, x_refsource_MS | |
http://secunia.com/advisories/30051 | third-party-advisory, x_refsource_SECUNIA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4730 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:24:42.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-1777", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1777" }, { "name": "29522", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29522" }, { "name": "TA08-162B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "1020221", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020221" }, { "name": "MS08-030", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-030" }, { "name": "30051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30051" }, { "name": "oval:org.mitre.oval:def:4730", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4730" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The Bluetooth stack in Microsoft Windows XP SP2 and SP3, and Vista Gold and SP1, allows physically proximate attackers to execute arbitrary code via a large series of Service Discovery Protocol (SDP) packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "ADV-2008-1777", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1777" }, { "name": "29522", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29522" }, { "name": "TA08-162B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "1020221", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020221" }, { "name": "MS08-030", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-030" }, { "name": "30051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30051" }, { "name": "oval:org.mitre.oval:def:4730", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4730" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-1453", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Bluetooth stack in Microsoft Windows XP SP2 and SP3, and Vista Gold and SP1, allows physically proximate attackers to execute arbitrary code via a large series of Service Discovery Protocol (SDP) packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-1777", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1777" }, { "name": "29522", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29522" }, { "name": "TA08-162B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "1020221", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020221" }, { "name": "MS08-030", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-030" }, { "name": "30051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30051" }, { "name": "oval:org.mitre.oval:def:4730", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4730" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-1453", "datePublished": "2008-06-12T01:30:00", "dateReserved": "2008-03-21T00:00:00", "dateUpdated": "2024-08-07T08:24:42.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3630
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/31822 | third-party-advisory, x_refsource_SECUNIA | |
http://support.apple.com/kb/HT2990 | x_refsource_CONFIRM | |
http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html | vendor-advisory, x_refsource_APPLE | |
http://www.securitytracker.com/id?1020844 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2008/2524 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/31093 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:45:18.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31822", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31822" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT2990" }, { "name": "APPLE-SA-2009-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html" }, { "name": "1020844", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020844" }, { "name": "ADV-2008-2524", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2524" }, { "name": "31093", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31093" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "mDNSResponder in Apple Bonjour for Windows before 1.0.5, when an application uses the Bonjour API for unicast DNS, does not choose random values for transaction IDs or source ports in DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-09-24T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31822", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31822" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT2990" }, { "name": "APPLE-SA-2009-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html" }, { "name": "1020844", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020844" }, { "name": "ADV-2008-2524", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2524" }, { "name": "31093", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31093" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3630", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mDNSResponder in Apple Bonjour for Windows before 1.0.5, when an application uses the Bonjour API for unicast DNS, does not choose random values for transaction IDs or source ports in DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31822", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31822" }, { "name": "http://support.apple.com/kb/HT2990", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT2990" }, { "name": "APPLE-SA-2009-09-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html" }, { "name": "1020844", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020844" }, { "name": "ADV-2008-2524", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2524" }, { "name": "31093", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31093" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3630", "datePublished": "2008-09-10T16:00:00", "dateReserved": "2008-08-12T00:00:00", "dateUpdated": "2024-08-07T09:45:18.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-2246
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6060 | vdb-entry, signature, x_refsource_OVAL | |
http://www.us-cert.gov/cas/techalerts/TA08-225A.html | third-party-advisory, x_refsource_CERT | |
http://marc.info/?l=bugtraq&m=121915960406986&w=2 | vendor-advisory, x_refsource_HP | |
http://marc.info/?l=bugtraq&m=121915960406986&w=2 | vendor-advisory, x_refsource_HP | |
http://secunia.com/advisories/31411 | third-party-advisory, x_refsource_SECUNIA | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-047 | vendor-advisory, x_refsource_MS | |
http://www.vupen.com/english/advisories/2008/2351 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1020678 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/30634 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:58:00.780Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:6060", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6060" }, { "name": "TA08-225A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "name": "HPSBST02360", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "SSRT080117", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "31411", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31411" }, { "name": "MS08-047", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-047" }, { "name": "ADV-2008-2351", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2351" }, { "name": "1020678", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020678" }, { "name": "30634", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30634" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Windows Vista through SP1 and Server 2008 do not properly import the default IPsec policy from a Windows Server 2003 domain to a Windows Server 2008 domain, which prevents IPsec rules from being enforced and allows remote attackers to bypass intended access restrictions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "oval:org.mitre.oval:def:6060", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6060" }, { "name": "TA08-225A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "name": "HPSBST02360", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "SSRT080117", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "31411", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31411" }, { "name": "MS08-047", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-047" }, { "name": "ADV-2008-2351", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2351" }, { "name": "1020678", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020678" }, { "name": "30634", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30634" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-2246", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Windows Vista through SP1 and Server 2008 do not properly import the default IPsec policy from a Windows Server 2003 domain to a Windows Server 2008 domain, which prevents IPsec rules from being enforced and allows remote attackers to bypass intended access restrictions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:6060", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6060" }, { "name": "TA08-225A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "name": "HPSBST02360", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "SSRT080117", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "31411", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31411" }, { "name": "MS08-047", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-047" }, { "name": "ADV-2008-2351", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2351" }, { "name": "1020678", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020678" }, { "name": "30634", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30634" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-2246", "datePublished": "2008-08-13T00:00:00", "dateReserved": "2008-05-16T00:00:00", "dateUpdated": "2024-08-07T08:58:00.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1931
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/29953 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/491249/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/1350/references | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41976 | vdb-entry, x_refsource_XF | |
http://www.wintercore.com/advisories/advisory_W010408.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/28909 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:41:00.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29953" }, { "name": "20080423 [W01-0408] Realtek HD Audio Codec Drivers (Vista) - Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/491249/100/0/threaded" }, { "name": "ADV-2008-1350", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1350/references" }, { "name": "realtek-ioctl-privilege-escalation(41976)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41976" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.wintercore.com/advisories/advisory_W010408.html" }, { "name": "28909", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28909" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allow local users to create, write, and read registry keys via a crafted IOCTL request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29953" }, { "name": "20080423 [W01-0408] Realtek HD Audio Codec Drivers (Vista) - Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/491249/100/0/threaded" }, { "name": "ADV-2008-1350", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1350/references" }, { "name": "realtek-ioctl-privilege-escalation(41976)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41976" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.wintercore.com/advisories/advisory_W010408.html" }, { "name": "28909", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28909" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1931", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allow local users to create, write, and read registry keys via a crafted IOCTL request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29953", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29953" }, { "name": "20080423 [W01-0408] Realtek HD Audio Codec Drivers (Vista) - Local Privilege Escalation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/491249/100/0/threaded" }, { "name": "ADV-2008-1350", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1350/references" }, { "name": "realtek-ioctl-privilege-escalation(41976)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41976" }, { "name": "http://www.wintercore.com/advisories/advisory_W010408.html", "refsource": "MISC", "url": "http://www.wintercore.com/advisories/advisory_W010408.html" }, { "name": "28909", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28909" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1931", "datePublished": "2008-04-24T18:00:00", "dateReserved": "2008-04-24T00:00:00", "dateUpdated": "2024-08-07T08:41:00.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1471
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/29311 | third-party-advisory, x_refsource_SECUNIA | |
http://www.pandasecurity.com/homeusers/support/card?id=41337&idIdioma=2&ref=ProdExp | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2008/0801/references | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/28150 | vdb-entry, x_refsource_BID | |
http://www.trapkit.de/advisories/TKADV2008-001.txt | x_refsource_MISC | |
http://www.securitytracker.com/id?1019568 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/489292/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.pandasecurity.com/homeusers/support/card?id=41231&idIdioma=2&ref=ProdExp | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41079 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:24:42.857Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29311", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29311" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.pandasecurity.com/homeusers/support/card?id=41337\u0026idIdioma=2\u0026ref=ProdExp" }, { "name": "ADV-2008-0801", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0801/references" }, { "name": "28150", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28150" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.trapkit.de/advisories/TKADV2008-001.txt" }, { "name": "1019568", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019568" }, { "name": "20080308 [TKADV2008-001] Panda Internet Security/Antivirus+Firewall 2008 cpoint.sys Kernel Driver Memory Corruption Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489292/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.pandasecurity.com/homeusers/support/card?id=41231\u0026idIdioma=2\u0026ref=ProdExp" }, { "name": "panda-antivirus-cpointsys-priv-escalation(41079)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The cpoint.sys driver in Panda Internet Security 2008 and Antivirus+ Firewall 2008 allows local users to cause a denial of service (system crash or kernel panic), overwrite memory, or execute arbitrary code via a crafted IOCTL request that triggers an out-of-bounds write of kernel memory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29311", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29311" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.pandasecurity.com/homeusers/support/card?id=41337\u0026idIdioma=2\u0026ref=ProdExp" }, { "name": "ADV-2008-0801", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0801/references" }, { "name": "28150", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28150" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.trapkit.de/advisories/TKADV2008-001.txt" }, { "name": "1019568", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019568" }, { "name": "20080308 [TKADV2008-001] Panda Internet Security/Antivirus+Firewall 2008 cpoint.sys Kernel Driver Memory Corruption Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489292/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.pandasecurity.com/homeusers/support/card?id=41231\u0026idIdioma=2\u0026ref=ProdExp" }, { "name": "panda-antivirus-cpointsys-priv-escalation(41079)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The cpoint.sys driver in Panda Internet Security 2008 and Antivirus+ Firewall 2008 allows local users to cause a denial of service (system crash or kernel panic), overwrite memory, or execute arbitrary code via a crafted IOCTL request that triggers an out-of-bounds write of kernel memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29311", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29311" }, { "name": "http://www.pandasecurity.com/homeusers/support/card?id=41337\u0026idIdioma=2\u0026ref=ProdExp", "refsource": "CONFIRM", "url": "http://www.pandasecurity.com/homeusers/support/card?id=41337\u0026idIdioma=2\u0026ref=ProdExp" }, { "name": "ADV-2008-0801", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0801/references" }, { "name": "28150", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28150" }, { "name": "http://www.trapkit.de/advisories/TKADV2008-001.txt", "refsource": "MISC", "url": "http://www.trapkit.de/advisories/TKADV2008-001.txt" }, { "name": "1019568", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019568" }, { "name": "20080308 [TKADV2008-001] Panda Internet Security/Antivirus+Firewall 2008 cpoint.sys Kernel Driver Memory Corruption Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489292/100/0/threaded" }, { "name": "http://www.pandasecurity.com/homeusers/support/card?id=41231\u0026idIdioma=2\u0026ref=ProdExp", "refsource": "CONFIRM", "url": "http://www.pandasecurity.com/homeusers/support/card?id=41231\u0026idIdioma=2\u0026ref=ProdExp" }, { "name": "panda-antivirus-cpointsys-priv-escalation(41079)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1471", "datePublished": "2008-03-24T22:00:00", "dateReserved": "2008-03-24T00:00:00", "dateUpdated": "2024-08-07T08:24:42.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3635
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/31086 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2008/2527 | vdb-entry, x_refsource_VUPEN | |
http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html | vendor-advisory, x_refsource_APPLE | |
http://securitytracker.com/id?1020841 | vdb-entry, x_refsource_SECTRACK | |
http://www.zerodayinitiative.com/advisories/ZDI-08-057/ | x_refsource_MISC | |
http://support.apple.com/kb/HT3027 | x_refsource_CONFIRM | |
http://secunia.com/advisories/31821 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/496201/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:45:18.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31086", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "1020841", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020841" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-057/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31821" }, { "name": "20080909 ZDI-08-057: Apple QuickTime IV32 Codec Parsing Stack Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/496201/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in QuickTimeInternetExtras.qtx in an unspecified third-party Indeo v3.2 (aka IV32) codec for QuickTime, when used with Apple QuickTime before 7.5.5 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31086", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "1020841", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020841" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-057/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31821" }, { "name": "20080909 ZDI-08-057: Apple QuickTime IV32 Codec Parsing Stack Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/496201/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3635", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in QuickTimeInternetExtras.qtx in an unspecified third-party Indeo v3.2 (aka IV32) codec for QuickTime, when used with Apple QuickTime before 7.5.5 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31086", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-09-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "1020841", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020841" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-08-057/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-057/" }, { "name": "http://support.apple.com/kb/HT3027", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31821" }, { "name": "20080909 ZDI-08-057: Apple QuickTime IV32 Codec Parsing Stack Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/496201/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3635", "datePublished": "2008-09-10T16:00:00", "dateReserved": "2008-08-12T00:00:00", "dateUpdated": "2024-08-07T09:45:18.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1444
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:24:41.775Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-1780", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1780" }, { "name": "3937", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3937" }, { "name": "1020223", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020223" }, { "name": "MS08-033", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033" }, { "name": "29578", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29578" }, { "name": "oval:org.mitre.oval:def:5562", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5562" }, { "name": "TA08-162B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "HPSBST02344", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-040/" }, { "name": "30579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30579" }, { "name": "20080610 ZDI-08-040: Microsoft DirectX SAMI File Format Name Parsing Stack Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493250/100/0/threaded" }, { "name": "SSRT080087", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a Synchronized Accessible Media Interchange (SAMI) file with crafted parameters for a Class Name variable, aka the \"SAMI Format Parsing Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "ADV-2008-1780", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1780" }, { "name": "3937", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3937" }, { "name": "1020223", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020223" }, { "name": "MS08-033", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033" }, { "name": "29578", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29578" }, { "name": "oval:org.mitre.oval:def:5562", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5562" }, { "name": "TA08-162B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "HPSBST02344", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-040/" }, { "name": "30579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30579" }, { "name": "20080610 ZDI-08-040: Microsoft DirectX SAMI File Format Name Parsing Stack Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493250/100/0/threaded" }, { "name": "SSRT080087", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-1444", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a Synchronized Accessible Media Interchange (SAMI) file with crafted parameters for a Class Name variable, aka the \"SAMI Format Parsing Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-1780", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1780" }, { "name": "3937", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3937" }, { "name": "1020223", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020223" }, { "name": "MS08-033", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033" }, { "name": "29578", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29578" }, { "name": "oval:org.mitre.oval:def:5562", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5562" }, { "name": "TA08-162B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "HPSBST02344", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-08-040/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-040/" }, { "name": "30579", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30579" }, { "name": "20080610 ZDI-08-040: Microsoft DirectX SAMI File Format Name Parsing Stack Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493250/100/0/threaded" }, { "name": "SSRT080087", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-1444", "datePublished": "2008-06-12T01:30:00", "dateReserved": "2008-03-21T00:00:00", "dateUpdated": "2024-08-07T08:24:41.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3629
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/31086 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2008/2527 | vdb-entry, x_refsource_VUPEN | |
http://lists.apple.com/archives/security-announce/2008/Oct/msg00000.html | vendor-advisory, x_refsource_APPLE | |
http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html | vendor-advisory, x_refsource_APPLE | |
http://www.vupen.com/english/advisories/2008/2735 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16019 | vdb-entry, signature, x_refsource_OVAL | |
http://securitytracker.com/id?1020841 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/31548 | vdb-entry, x_refsource_BID | |
http://support.apple.com/kb/HT3189 | x_refsource_CONFIRM | |
http://secunia.com/advisories/32121 | third-party-advisory, x_refsource_SECUNIA | |
http://support.apple.com/kb/HT3027 | x_refsource_CONFIRM | |
http://secunia.com/advisories/31821 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:45:18.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31086", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-10-02", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00000.html" }, { "name": "APPLE-SA-2008-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "ADV-2008-2735", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2735" }, { "name": "oval:org.mitre.oval:def:16019", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16019" }, { "name": "1020841", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020841" }, { "name": "31548", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31548" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3189" }, { "name": "32121", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32121" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31821" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Apple QuickTime before 7.5.5 allows remote attackers to cause a denial of service (application crash) via a crafted PICT image that triggers an out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31086", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-10-02", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00000.html" }, { "name": "APPLE-SA-2008-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "ADV-2008-2735", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2735" }, { "name": "oval:org.mitre.oval:def:16019", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16019" }, { "name": "1020841", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020841" }, { "name": "31548", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31548" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3189" }, { "name": "32121", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32121" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31821" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3629", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apple QuickTime before 7.5.5 allows remote attackers to cause a denial of service (application crash) via a crafted PICT image that triggers an out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31086", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-10-02", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00000.html" }, { "name": "APPLE-SA-2008-09-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "ADV-2008-2735", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2735" }, { "name": "oval:org.mitre.oval:def:16019", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16019" }, { "name": "1020841", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020841" }, { "name": "31548", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31548" }, { "name": "http://support.apple.com/kb/HT3189", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3189" }, { "name": "32121", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32121" }, { "name": "http://support.apple.com/kb/HT3027", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31821" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3629", "datePublished": "2008-09-10T16:00:00", "dateReserved": "2008-08-12T00:00:00", "dateUpdated": "2024-08-07T09:45:18.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1086
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:08:57.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA08-099A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "name": "SSRT080048", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "oval:org.mitre.oval:def:5475", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5475" }, { "name": "HPSBST02329", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "29714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29714" }, { "name": "1019800", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019800" }, { "name": "ie-hxvz-code-execution(41464)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41464" }, { "name": "20080408 Microsoft HxTocCtrl ActiveX Control Invalid Param Heap Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=680" }, { "name": "ADV-2008-1147", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1147/references" }, { "name": "28606", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28606" }, { "name": "MS08-023", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-023" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The HxTocCtrl ActiveX control (hxvz.dll), as used in Microsoft Internet Explorer 5.01 SP4 and 6 SP1, in Windows XP SP2, Server 2003 SP1 and SP2, Vista SP1, and Server 2008, allows remote attackers to execute arbitrary code via malformed arguments, which triggers memory corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "TA08-099A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "name": "SSRT080048", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "oval:org.mitre.oval:def:5475", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5475" }, { "name": "HPSBST02329", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "29714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29714" }, { "name": "1019800", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019800" }, { "name": "ie-hxvz-code-execution(41464)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41464" }, { "name": "20080408 Microsoft HxTocCtrl ActiveX Control Invalid Param Heap Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=680" }, { "name": "ADV-2008-1147", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1147/references" }, { "name": "28606", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28606" }, { "name": "MS08-023", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-023" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-1086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HxTocCtrl ActiveX control (hxvz.dll), as used in Microsoft Internet Explorer 5.01 SP4 and 6 SP1, in Windows XP SP2, Server 2003 SP1 and SP2, Vista SP1, and Server 2008, allows remote attackers to execute arbitrary code via malformed arguments, which triggers memory corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA08-099A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "name": "SSRT080048", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "oval:org.mitre.oval:def:5475", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5475" }, { "name": "HPSBST02329", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "29714", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29714" }, { "name": "1019800", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019800" }, { "name": "ie-hxvz-code-execution(41464)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41464" }, { "name": "20080408 Microsoft HxTocCtrl ActiveX Control Invalid Param Heap Corruption Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=680" }, { "name": "ADV-2008-1147", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1147/references" }, { "name": "28606", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28606" }, { "name": "MS08-023", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-023" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-1086", "datePublished": "2008-04-08T23:00:00", "dateReserved": "2008-02-28T00:00:00", "dateUpdated": "2024-08-07T08:08:57.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0087
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA08-099A.html | third-party-advisory, x_refsource_CERT | |
http://marc.info/?l=bugtraq&m=120845064910729&w=2 | vendor-advisory, x_refsource_HP | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020 | vendor-advisory, x_refsource_MS | |
http://secunia.com/advisories/29696 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=120845064910729&w=2 | vendor-advisory, x_refsource_HP | |
http://www.trusteer.com/docs/windowsresolver.html | x_refsource_MISC | |
http://www.securitytracker.com/id?1019802 | vdb-entry, x_refsource_SECTRACK | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5314 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2008/1144/references | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/490575/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/28553 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:24.136Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA08-099A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "name": "SSRT080048", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "MS08-020", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020" }, { "name": "29696", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29696" }, { "name": "HPSBST02329", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.trusteer.com/docs/windowsresolver.html" }, { "name": "1019802", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019802" }, { "name": "oval:org.mitre.oval:def:5314", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5314" }, { "name": "ADV-2008-1144", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1144/references" }, { "name": "20080408 Microsoft Windows DNS Stub Resolver Cache Poisoning (MS08-020)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490575/100/0/threaded" }, { "name": "28553", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28553" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The DNS client in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, and Vista uses predictable DNS transaction IDs, which allows remote attackers to spoof DNS responses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "TA08-099A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "name": "SSRT080048", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "MS08-020", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020" }, { "name": "29696", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29696" }, { "name": "HPSBST02329", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.trusteer.com/docs/windowsresolver.html" }, { "name": "1019802", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019802" }, { "name": "oval:org.mitre.oval:def:5314", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5314" }, { "name": "ADV-2008-1144", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1144/references" }, { "name": "20080408 Microsoft Windows DNS Stub Resolver Cache Poisoning (MS08-020)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490575/100/0/threaded" }, { "name": "28553", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28553" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-0087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DNS client in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, and Vista uses predictable DNS transaction IDs, which allows remote attackers to spoof DNS responses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA08-099A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "name": "SSRT080048", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "MS08-020", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020" }, { "name": "29696", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29696" }, { "name": "HPSBST02329", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "http://www.trusteer.com/docs/windowsresolver.html", "refsource": "MISC", "url": "http://www.trusteer.com/docs/windowsresolver.html" }, { "name": "1019802", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019802" }, { "name": "oval:org.mitre.oval:def:5314", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5314" }, { "name": "ADV-2008-1144", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1144/references" }, { "name": "20080408 Microsoft Windows DNS Stub Resolver Cache Poisoning (MS08-020)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/490575/100/0/threaded" }, { "name": "28553", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28553" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-0087", "datePublished": "2008-04-08T23:00:00", "dateReserved": "2008-01-03T00:00:00", "dateUpdated": "2024-08-07T07:32:24.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1445
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/1782 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/29584 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1020229 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/493338/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.us-cert.gov/cas/techalerts/TA08-162B.html | third-party-advisory, x_refsource_CERT | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035 | vendor-advisory, x_refsource_MS | |
http://www.securityfocus.com/archive/1/493342/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/30586 | third-party-advisory, x_refsource_SECUNIA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4910 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:24:41.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-1782", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1782" }, { "name": "29584", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29584" }, { "name": "1020229", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020229" }, { "name": "20080613 Securify bulletin: Microsoft Active Directory Denial-of-service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493338/100/0/threaded" }, { "name": "TA08-162B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "MS08-035", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035" }, { "name": "20080613 RE: Securify bulletin: Microsoft Active Directory Denial-of-service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493342/100/0/threaded" }, { "name": "30586", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30586" }, { "name": "oval:org.mitre.oval:def:4910", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4910" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Active Directory on Microsoft Windows 2000 Server SP4, XP Professional SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to cause a denial of service (system hang or reboot) via a crafted LDAP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "ADV-2008-1782", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1782" }, { "name": "29584", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29584" }, { "name": "1020229", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020229" }, { "name": "20080613 Securify bulletin: Microsoft Active Directory Denial-of-service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493338/100/0/threaded" }, { "name": "TA08-162B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "MS08-035", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035" }, { "name": "20080613 RE: Securify bulletin: Microsoft Active Directory Denial-of-service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493342/100/0/threaded" }, { "name": "30586", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30586" }, { "name": "oval:org.mitre.oval:def:4910", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4910" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-1445", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Active Directory on Microsoft Windows 2000 Server SP4, XP Professional SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to cause a denial of service (system hang or reboot) via a crafted LDAP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-1782", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1782" }, { "name": "29584", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29584" }, { "name": "1020229", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020229" }, { "name": "20080613 Securify bulletin: Microsoft Active Directory Denial-of-service", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493338/100/0/threaded" }, { "name": "TA08-162B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "MS08-035", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035" }, { "name": "20080613 RE: Securify bulletin: Microsoft Active Directory Denial-of-service", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493342/100/0/threaded" }, { "name": "30586", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30586" }, { "name": "oval:org.mitre.oval:def:4910", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4910" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-1445", "datePublished": "2008-06-12T01:30:00", "dateReserved": "2008-03-21T00:00:00", "dateUpdated": "2024-08-07T08:24:41.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0011
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/1780 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5236 | vdb-entry, signature, x_refsource_OVAL | |
http://securitytracker.com/id?1020222 | vdb-entry, x_refsource_SECTRACK | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033 | vendor-advisory, x_refsource_MS | |
http://www.us-cert.gov/cas/techalerts/TA08-162B.html | third-party-advisory, x_refsource_CERT | |
http://marc.info/?l=bugtraq&m=121380194923597&w=2 | vendor-advisory, x_refsource_HP | |
http://www.securityfocus.com/bid/29581 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/30579 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=121380194923597&w=2 | vendor-advisory, x_refsource_HP |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:23.461Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-1780", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1780" }, { "name": "oval:org.mitre.oval:def:5236", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5236" }, { "name": "1020222", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020222" }, { "name": "MS08-033", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033" }, { "name": "TA08-162B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "HPSBST02344", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "name": "29581", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29581" }, { "name": "30579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30579" }, { "name": "SSRT080087", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the \"MJPEG Decoder Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2008-1780", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1780" }, { "name": "oval:org.mitre.oval:def:5236", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5236" }, { "name": "1020222", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020222" }, { "name": "MS08-033", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033" }, { "name": "TA08-162B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "HPSBST02344", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "name": "29581", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29581" }, { "name": "30579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30579" }, { "name": "SSRT080087", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0011", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the \"MJPEG Decoder Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-1780", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1780" }, { "name": "oval:org.mitre.oval:def:5236", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5236" }, { "name": "1020222", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020222" }, { "name": "MS08-033", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033" }, { "name": "TA08-162B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html" }, { "name": "HPSBST02344", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" }, { "name": "29581", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29581" }, { "name": "30579", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30579" }, { "name": "SSRT080087", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0011", "datePublished": "2008-06-12T01:30:00", "dateReserved": "2007-12-13T00:00:00", "dateUpdated": "2024-08-07T07:32:23.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1087
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:08:57.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "44215", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/44215" }, { "name": "TA08-099A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "name": "SSRT080048", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "ADV-2008-1145", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1145/references" }, { "name": "MS08-021", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021" }, { "name": "28570", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28570" }, { "name": "HPSBST02329", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "oval:org.mitre.oval:def:5580", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5580" }, { "name": "6656", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6656" }, { "name": "5442", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5442" }, { "name": "1019798", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019798" }, { "name": "29704", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29704" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF image file with crafted filename parameters, aka \"GDI Stack Overflow Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "44215", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/44215" }, { "name": "TA08-099A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "name": "SSRT080048", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "ADV-2008-1145", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1145/references" }, { "name": "MS08-021", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021" }, { "name": "28570", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28570" }, { "name": "HPSBST02329", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "oval:org.mitre.oval:def:5580", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5580" }, { "name": "6656", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6656" }, { "name": "5442", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5442" }, { "name": "1019798", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019798" }, { "name": "29704", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29704" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-1087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF image file with crafted filename parameters, aka \"GDI Stack Overflow Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "44215", "refsource": "OSVDB", "url": "http://www.osvdb.org/44215" }, { "name": "TA08-099A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html" }, { "name": "SSRT080048", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "ADV-2008-1145", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1145/references" }, { "name": "MS08-021", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021" }, { "name": "28570", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28570" }, { "name": "HPSBST02329", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=120845064910729\u0026w=2" }, { "name": "oval:org.mitre.oval:def:5580", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5580" }, { "name": "6656", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6656" }, { "name": "5442", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5442" }, { "name": "1019798", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019798" }, { "name": "29704", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29704" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-1087", "datePublished": "2008-04-08T23:00:00", "dateReserved": "2008-02-28T00:00:00", "dateUpdated": "2024-08-07T08:08:57.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3614
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:45:18.948Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31086", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "APPLE-SA-2008-09-15", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" }, { "name": "1020841", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020841" }, { "name": "oval:org.mitre.oval:def:15851", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15851" }, { "name": "TA08-260A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html" }, { "name": "ADV-2008-2584", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2584" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3137" }, { "name": "31882", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31882" }, { "name": "1020879", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020879" }, { "name": "20080909 Apple QuickTime PICT Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=744" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31821" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Apple QuickTime before 7.5.5 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PICT image, which triggers heap corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31086", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "APPLE-SA-2008-09-15", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" }, { "name": "1020841", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020841" }, { "name": "oval:org.mitre.oval:def:15851", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15851" }, { "name": "TA08-260A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html" }, { "name": "ADV-2008-2584", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2584" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3137" }, { "name": "31882", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31882" }, { "name": "1020879", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020879" }, { "name": "20080909 Apple QuickTime PICT Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=744" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31821" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3614", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Apple QuickTime before 7.5.5 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PICT image, which triggers heap corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31086", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31086" }, { "name": "ADV-2008-2527", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2527" }, { "name": "APPLE-SA-2008-09-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html" }, { "name": "APPLE-SA-2008-09-15", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" }, { "name": "1020841", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020841" }, { "name": "oval:org.mitre.oval:def:15851", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15851" }, { "name": "TA08-260A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html" }, { "name": "ADV-2008-2584", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2584" }, { "name": "http://support.apple.com/kb/HT3137", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3137" }, { "name": "31882", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31882" }, { "name": "1020879", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020879" }, { "name": "20080909 Apple QuickTime PICT Integer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=744" }, { "name": "http://support.apple.com/kb/HT3027", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3027" }, { "name": "31821", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31821" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3614", "datePublished": "2008-09-10T16:00:00", "dateReserved": "2008-08-12T00:00:00", "dateUpdated": "2024-08-07T09:45:18.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1457
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/2353 | vdb-entry, x_refsource_VUPEN | |
http://www.us-cert.gov/cas/techalerts/TA08-225A.html | third-party-advisory, x_refsource_CERT | |
http://www.securitytracker.com/id?1020677 | vdb-entry, x_refsource_SECTRACK | |
http://marc.info/?l=bugtraq&m=121915960406986&w=2 | vendor-advisory, x_refsource_HP | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049 | vendor-advisory, x_refsource_MS | |
http://marc.info/?l=bugtraq&m=121915960406986&w=2 | vendor-advisory, x_refsource_HP | |
http://secunia.com/advisories/31417 | third-party-advisory, x_refsource_SECUNIA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6095 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/bid/30584 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:24:41.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-2353", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2353" }, { "name": "TA08-225A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "name": "1020677", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020677" }, { "name": "HPSBST02360", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "MS08-049", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049" }, { "name": "SSRT080117", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "31417", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31417" }, { "name": "oval:org.mitre.oval:def:6095", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6095" }, { "name": "30584", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30584" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate per-user subscriptions, which allows remote authenticated users to execute arbitrary code via a crafted event subscription request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "ADV-2008-2353", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2353" }, { "name": "TA08-225A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "name": "1020677", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020677" }, { "name": "HPSBST02360", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "MS08-049", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049" }, { "name": "SSRT080117", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "31417", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31417" }, { "name": "oval:org.mitre.oval:def:6095", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6095" }, { "name": "30584", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30584" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-1457", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate per-user subscriptions, which allows remote authenticated users to execute arbitrary code via a crafted event subscription request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-2353", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2353" }, { "name": "TA08-225A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "name": "1020677", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020677" }, { "name": "HPSBST02360", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "MS08-049", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049" }, { "name": "SSRT080117", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "31417", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31417" }, { "name": "oval:org.mitre.oval:def:6095", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6095" }, { "name": "30584", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30584" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-1457", "datePublished": "2008-08-13T10:00:00", "dateReserved": "2008-03-21T00:00:00", "dateUpdated": "2024-08-07T08:24:41.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3014
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/32154 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor-advisory, x_refsource_HP | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 | vendor-advisory, x_refsource_MS | |
http://www.securityfocus.com/bid/31021 | vdb-entry, x_refsource_BID | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6004 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2008/2696 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1020837 | vdb-entry, x_refsource_SECTRACK | |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor-advisory, x_refsource_HP | |
http://www.us-cert.gov/cas/techalerts/TA08-253A.html | third-party-advisory, x_refsource_CERT | |
http://www.vupen.com/english/advisories/2008/2520 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:21:34.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32154", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32154" }, { "name": "HPSBST02372", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-052", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "name": "31021", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31021" }, { "name": "oval:org.mitre.oval:def:6004", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6004" }, { "name": "ADV-2008-2696", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "name": "1020837", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020837" }, { "name": "SSRT080133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "TA08-253A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2520", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2520" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed WMF image file that triggers improper memory allocation, aka \"GDI+ WMF Buffer Overrun Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "32154", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32154" }, { "name": "HPSBST02372", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-052", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "name": "31021", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31021" }, { "name": "oval:org.mitre.oval:def:6004", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6004" }, { "name": "ADV-2008-2696", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "name": "1020837", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020837" }, { "name": "SSRT080133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "TA08-253A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2520", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2520" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-3014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed WMF image file that triggers improper memory allocation, aka \"GDI+ WMF Buffer Overrun Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "32154", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32154" }, { "name": "HPSBST02372", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-052", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "name": "31021", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31021" }, { "name": "oval:org.mitre.oval:def:6004", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6004" }, { "name": "ADV-2008-2696", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "name": "1020837", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020837" }, { "name": "SSRT080133", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "TA08-253A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2520", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2520" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-3014", "datePublished": "2008-09-10T15:00:00", "dateReserved": "2008-07-07T00:00:00", "dateUpdated": "2024-08-07T09:21:34.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1436
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:24:42.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1019904", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019904" }, { "name": "oval:org.mitre.oval:def:5891", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5891" }, { "name": "20080419 Token Kidnapping (Microsoft Security Advisory 951306) presentation available", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/491111/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.microsoft.com/technet/security/advisory/951306.mspx" }, { "name": "ADV-2008-1264", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1264/references" }, { "name": "29867", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29867" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://securitywatch.eweek.com/flaws/microsoft_belatedly_admits_to_windows_server_2008_token_kidnapping.html" }, { "name": "6705", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6705" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html" }, { "name": "TA09-104A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-104A.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.argeniss.com/research/TokenKidnapping.pdf" }, { "name": "28833", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28833" }, { "name": "ms-windows-localsystem-privilege-escalation(41880)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41880" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.argeniss.com/research/Churrasco.zip" }, { "name": "MS09-012", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012" }, { "name": "20081008 Token Kidnapping Windows 2003 PoC exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497168/100/0/threaded" }, { "name": "ADV-2009-1026", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1026" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://isc.sans.org/diary.html?storyid=4306" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://milw0rm.com/sploits/2008-Churrasco.zip" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blogs.technet.com/msrc/archive/2008/04/17/msrc-blog-microsoft-security-advisory-951306.aspx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Windows XP Professional SP2, Vista, and Server 2003 and 2008 does not properly assign activities to the (1) NetworkService and (2) LocalService accounts, which might allow context-dependent attackers to gain privileges by using one service process to capture a resource from a second service process that has a LocalSystem privilege-escalation ability, related to improper management of the SeImpersonatePrivilege user right, as originally reported for Internet Information Services (IIS), aka Token Kidnapping." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "1019904", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019904" }, { "name": "oval:org.mitre.oval:def:5891", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5891" }, { "name": "20080419 Token Kidnapping (Microsoft Security Advisory 951306) presentation available", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/491111/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.microsoft.com/technet/security/advisory/951306.mspx" }, { "name": "ADV-2008-1264", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1264/references" }, { "name": "29867", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29867" }, { "tags": [ "x_refsource_MISC" ], "url": "http://securitywatch.eweek.com/flaws/microsoft_belatedly_admits_to_windows_server_2008_token_kidnapping.html" }, { "name": "6705", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6705" }, { "tags": [ "x_refsource_MISC" ], "url": "http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html" }, { "name": "TA09-104A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-104A.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.argeniss.com/research/TokenKidnapping.pdf" }, { "name": "28833", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28833" }, { "name": "ms-windows-localsystem-privilege-escalation(41880)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41880" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.argeniss.com/research/Churrasco.zip" }, { "name": "MS09-012", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012" }, { "name": "20081008 Token Kidnapping Windows 2003 PoC exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497168/100/0/threaded" }, { "name": "ADV-2009-1026", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1026" }, { "tags": [ "x_refsource_MISC" ], "url": "http://isc.sans.org/diary.html?storyid=4306" }, { "tags": [ "x_refsource_MISC" ], "url": "http://milw0rm.com/sploits/2008-Churrasco.zip" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blogs.technet.com/msrc/archive/2008/04/17/msrc-blog-microsoft-security-advisory-951306.aspx" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-1436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Windows XP Professional SP2, Vista, and Server 2003 and 2008 does not properly assign activities to the (1) NetworkService and (2) LocalService accounts, which might allow context-dependent attackers to gain privileges by using one service process to capture a resource from a second service process that has a LocalSystem privilege-escalation ability, related to improper management of the SeImpersonatePrivilege user right, as originally reported for Internet Information Services (IIS), aka Token Kidnapping." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1019904", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019904" }, { "name": "oval:org.mitre.oval:def:5891", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5891" }, { "name": "20080419 Token Kidnapping (Microsoft Security Advisory 951306) presentation available", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/491111/100/0/threaded" }, { "name": "http://www.microsoft.com/technet/security/advisory/951306.mspx", "refsource": "CONFIRM", "url": "http://www.microsoft.com/technet/security/advisory/951306.mspx" }, { "name": "ADV-2008-1264", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1264/references" }, { "name": "29867", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29867" }, { "name": "http://securitywatch.eweek.com/flaws/microsoft_belatedly_admits_to_windows_server_2008_token_kidnapping.html", "refsource": "MISC", "url": "http://securitywatch.eweek.com/flaws/microsoft_belatedly_admits_to_windows_server_2008_token_kidnapping.html" }, { "name": "6705", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6705" }, { "name": "http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html", "refsource": "MISC", "url": "http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html" }, { "name": "TA09-104A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-104A.html" }, { "name": "http://www.argeniss.com/research/TokenKidnapping.pdf", "refsource": "MISC", "url": "http://www.argeniss.com/research/TokenKidnapping.pdf" }, { "name": "28833", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28833" }, { "name": "ms-windows-localsystem-privilege-escalation(41880)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41880" }, { "name": "http://www.argeniss.com/research/Churrasco.zip", "refsource": "MISC", "url": "http://www.argeniss.com/research/Churrasco.zip" }, { "name": "MS09-012", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012" }, { "name": "20081008 Token Kidnapping Windows 2003 PoC exploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497168/100/0/threaded" }, { "name": "ADV-2009-1026", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1026" }, { "name": "http://isc.sans.org/diary.html?storyid=4306", "refsource": "MISC", "url": "http://isc.sans.org/diary.html?storyid=4306" }, { "name": "http://milw0rm.com/sploits/2008-Churrasco.zip", "refsource": "MISC", "url": "http://milw0rm.com/sploits/2008-Churrasco.zip" }, { "name": "http://blogs.technet.com/msrc/archive/2008/04/17/msrc-blog-microsoft-security-advisory-951306.aspx", "refsource": "CONFIRM", "url": "http://blogs.technet.com/msrc/archive/2008/04/17/msrc-blog-microsoft-security-advisory-951306.aspx" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-1436", "datePublished": "2008-04-21T17:00:00", "dateReserved": "2008-03-21T00:00:00", "dateUpdated": "2024-08-07T08:24:42.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-0005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/0575 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/16644 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24493 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1015628 | vdb-entry, x_refsource_SECTRACK | |
http://www.kb.cert.org/vuls/id/692060 | third-party-advisory, x_refsource_CERT-VN | |
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=393 | third-party-advisory, x_refsource_IDEFENSE | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-006 | vendor-advisory, x_refsource_MS | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1559 | vdb-entry, signature, x_refsource_OVAL | |
http://www.us-cert.gov/cas/techalerts/TA06-045A.html | third-party-advisory, x_refsource_CERT | |
http://secunia.com/advisories/18852 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:18:20.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-0575", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0575" }, { "name": "16644", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16644" }, { "name": "win-mediaplayer-plugin-embed-bo(24493)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24493" }, { "name": "1015628", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015628" }, { "name": "VU#692060", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/692060" }, { "name": "20060214 Microsoft Windows Media Player Plugin Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=393" }, { "name": "MS06-006", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-006" }, { "name": "oval:org.mitre.oval:def:1559", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1559" }, { "name": "TA06-045A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-045A.html" }, { "name": "18852", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18852" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "ADV-2006-0575", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0575" }, { "name": "16644", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16644" }, { "name": "win-mediaplayer-plugin-embed-bo(24493)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24493" }, { "name": "1015628", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015628" }, { "name": "VU#692060", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/692060" }, { "name": "20060214 Microsoft Windows Media Player Plugin Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=393" }, { "name": "MS06-006", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-006" }, { "name": "oval:org.mitre.oval:def:1559", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1559" }, { "name": "TA06-045A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-045A.html" }, { "name": "18852", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18852" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2006-0005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-0575", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0575" }, { "name": "16644", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16644" }, { "name": "win-mediaplayer-plugin-embed-bo(24493)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24493" }, { "name": "1015628", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015628" }, { "name": "VU#692060", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/692060" }, { "name": "20060214 Microsoft Windows Media Player Plugin Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=393" }, { "name": "MS06-006", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-006" }, { "name": "oval:org.mitre.oval:def:1559", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1559" }, { "name": "TA06-045A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-045A.html" }, { "name": "18852", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18852" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2006-0005", "datePublished": "2006-02-14T19:00:00", "dateReserved": "2005-11-09T00:00:00", "dateUpdated": "2024-08-07T16:18:20.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-2326
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/31822 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1020845 | vdb-entry, x_refsource_SECTRACK | |
http://support.apple.com/kb/HT2990 | x_refsource_CONFIRM | |
http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html | vendor-advisory, x_refsource_APPLE | |
http://www.securityfocus.com/bid/31091 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2008/2524 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45005 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:58:02.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31822", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31822" }, { "name": "1020845", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT2990" }, { "name": "APPLE-SA-2009-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html" }, { "name": "31091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31091" }, { "name": "ADV-2008-2524", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2524" }, { "name": "apple-bonjour-mdnsresponder-dos(45005)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45005" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "mDNSResponder in the Bonjour Namespace Provider in Apple Bonjour for Windows before 1.0.5 allows attackers to cause a denial of service (NULL pointer dereference and application crash) by resolving a crafted .local domain name that contains a long label." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31822", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31822" }, { "name": "1020845", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT2990" }, { "name": "APPLE-SA-2009-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html" }, { "name": "31091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31091" }, { "name": "ADV-2008-2524", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2524" }, { "name": "apple-bonjour-mdnsresponder-dos(45005)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45005" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-2326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mDNSResponder in the Bonjour Namespace Provider in Apple Bonjour for Windows before 1.0.5 allows attackers to cause a denial of service (NULL pointer dereference and application crash) by resolving a crafted .local domain name that contains a long label." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31822", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31822" }, { "name": "1020845", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020845" }, { "name": "http://support.apple.com/kb/HT2990", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT2990" }, { "name": "APPLE-SA-2009-09-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html" }, { "name": "31091", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31091" }, { "name": "ADV-2008-2524", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2524" }, { "name": "apple-bonjour-mdnsresponder-dos(45005)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45005" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2326", "datePublished": "2008-09-10T16:00:00", "dateReserved": "2008-05-18T00:00:00", "dateUpdated": "2024-08-07T08:58:02.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1932
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/29953 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42079 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/491249/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/1350/references | vdb-entry, x_refsource_VUPEN | |
http://www.wintercore.com/advisories/advisory_W010408.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/28909 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:40:59.871Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29953" }, { "name": "realtek-ioctl-overflow(42079)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42079" }, { "name": "20080423 [W01-0408] Realtek HD Audio Codec Drivers (Vista) - Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/491249/100/0/threaded" }, { "name": "ADV-2008-1350", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1350/references" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.wintercore.com/advisories/advisory_W010408.html" }, { "name": "28909", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28909" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allows local users to execute arbitrary code via a crafted IOCTL request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29953" }, { "name": "realtek-ioctl-overflow(42079)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42079" }, { "name": "20080423 [W01-0408] Realtek HD Audio Codec Drivers (Vista) - Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/491249/100/0/threaded" }, { "name": "ADV-2008-1350", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1350/references" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.wintercore.com/advisories/advisory_W010408.html" }, { "name": "28909", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28909" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1932", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allows local users to execute arbitrary code via a crafted IOCTL request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29953", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29953" }, { "name": "realtek-ioctl-overflow(42079)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42079" }, { "name": "20080423 [W01-0408] Realtek HD Audio Codec Drivers (Vista) - Local Privilege Escalation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/491249/100/0/threaded" }, { "name": "ADV-2008-1350", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1350/references" }, { "name": "http://www.wintercore.com/advisories/advisory_W010408.html", "refsource": "MISC", "url": "http://www.wintercore.com/advisories/advisory_W010408.html" }, { "name": "28909", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28909" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1932", "datePublished": "2008-04-24T18:00:00", "dateReserved": "2008-04-24T00:00:00", "dateUpdated": "2024-08-07T08:40:59.871Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3365
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/31239 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/494817/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44031 | vdb-entry, x_refsource_XF | |
http://securityreason.com/securityalert/4062 | third-party-advisory, x_refsource_SREASON | |
https://www.exploit-db.com/exploits/6150 | exploit, x_refsource_EXPLOIT-DB | |
http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2008/2207/references | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/30397 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:37:26.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31239" }, { "name": "20080728 [DSECRG-08-033] Local File Include Vulnerability in Pixelpost 1.7.1", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/494817/100/0/threaded" }, { "name": "pixelpost-languagefull-file-include(44031)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44031" }, { "name": "4062", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4062" }, { "name": "6150", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6150" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch" }, { "name": "ADV-2008-2207", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2207/references" }, { "name": "30397", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in index.php in Pixelpost 1.7.1 on Windows, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language_full parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31239" }, { "name": "20080728 [DSECRG-08-033] Local File Include Vulnerability in Pixelpost 1.7.1", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/494817/100/0/threaded" }, { "name": "pixelpost-languagefull-file-include(44031)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44031" }, { "name": "4062", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4062" }, { "name": "6150", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6150" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch" }, { "name": "ADV-2008-2207", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2207/references" }, { "name": "30397", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30397" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3365", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in index.php in Pixelpost 1.7.1 on Windows, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language_full parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31239", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31239" }, { "name": "20080728 [DSECRG-08-033] Local File Include Vulnerability in Pixelpost 1.7.1", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/494817/100/0/threaded" }, { "name": "pixelpost-languagefull-file-include(44031)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44031" }, { "name": "4062", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4062" }, { "name": "6150", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6150" }, { "name": "http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch", "refsource": "CONFIRM", "url": "http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch" }, { "name": "ADV-2008-2207", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2207/references" }, { "name": "30397", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30397" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3365", "datePublished": "2008-07-30T17:00:00", "dateReserved": "2008-07-30T00:00:00", "dateUpdated": "2024-08-07T09:37:26.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3843
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/496071/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44743 | vdb-entry, x_refsource_XF | |
http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf | x_refsource_MISC | |
http://securityreason.com/securityalert/4193 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/495667/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.procheckup.com/Vulnerability_PR08-20.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:53:00.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080908 Re: [WEB SECURITY] PR08-20: Bypassing ASP .NET \"ValidateRequest\" for Script Injection Attacks", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/496071/100/0/threaded" }, { "name": "asp-validaterequestfilter-xss(44743)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44743" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf" }, { "name": "4193", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4193" }, { "name": "20080821 PR08-20: Bypassing ASP .NET \"ValidateRequest\" for Script Injection Attacks", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/495667/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.procheckup.com/Vulnerability_PR08-20.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework with the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a \"\u003c~/\" (less-than tilde slash) sequence followed by a crafted STYLE element." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20080908 Re: [WEB SECURITY] PR08-20: Bypassing ASP .NET \"ValidateRequest\" for Script Injection Attacks", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/496071/100/0/threaded" }, { "name": "asp-validaterequestfilter-xss(44743)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44743" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf" }, { "name": "4193", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4193" }, { "name": "20080821 PR08-20: Bypassing ASP .NET \"ValidateRequest\" for Script Injection Attacks", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/495667/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.procheckup.com/Vulnerability_PR08-20.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3843", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework with the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a \"\u003c~/\" (less-than tilde slash) sequence followed by a crafted STYLE element." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080908 Re: [WEB SECURITY] PR08-20: Bypassing ASP .NET \"ValidateRequest\" for Script Injection Attacks", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/496071/100/0/threaded" }, { "name": "asp-validaterequestfilter-xss(44743)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44743" }, { "name": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf", "refsource": "MISC", "url": "http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf" }, { "name": "4193", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4193" }, { "name": "20080821 PR08-20: Bypassing ASP .NET \"ValidateRequest\" for Script Injection Attacks", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/495667/100/0/threaded" }, { "name": "http://www.procheckup.com/Vulnerability_PR08-20.php", "refsource": "MISC", "url": "http://www.procheckup.com/Vulnerability_PR08-20.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3843", "datePublished": "2008-08-27T20:00:00", "dateReserved": "2008-08-27T00:00:00", "dateUpdated": "2024-08-07T09:53:00.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-5348
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/32154 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor-advisory, x_refsource_HP | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 | vendor-advisory, x_refsource_MS | |
http://www.vupen.com/english/advisories/2008/2696 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1020834 | vdb-entry, x_refsource_SECTRACK | |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor-advisory, x_refsource_HP | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6055 | vdb-entry, signature, x_refsource_OVAL | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=743 | third-party-advisory, x_refsource_IDEFENSE | |
http://www.securityfocus.com/bid/31018 | vdb-entry, x_refsource_BID | |
http://www.us-cert.gov/cas/techalerts/TA08-253A.html | third-party-advisory, x_refsource_CERT | |
http://www.vupen.com/english/advisories/2008/2520 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:24:42.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32154", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32154" }, { "name": "HPSBST02372", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-052", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "name": "ADV-2008-2696", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "name": "1020834", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020834" }, { "name": "SSRT080133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "oval:org.mitre.oval:def:6055", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6055" }, { "name": "20080909 Microsoft Windows GDI+ Gradient Fill Heap Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=743" }, { "name": "31018", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31018" }, { "name": "TA08-253A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2520", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2520" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via an image file with crafted gradient sizes in gradient fill input, which triggers a heap-based buffer overflow related to GdiPlus.dll and VGX.DLL, aka \"GDI+ VML Buffer Overrun Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "32154", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32154" }, { "name": "HPSBST02372", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-052", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "name": "ADV-2008-2696", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "name": "1020834", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020834" }, { "name": "SSRT080133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "oval:org.mitre.oval:def:6055", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6055" }, { "name": "20080909 Microsoft Windows GDI+ Gradient Fill Heap Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=743" }, { "name": "31018", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31018" }, { "name": "TA08-253A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2520", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2520" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2007-5348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via an image file with crafted gradient sizes in gradient fill input, which triggers a heap-based buffer overflow related to GdiPlus.dll and VGX.DLL, aka \"GDI+ VML Buffer Overrun Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "32154", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32154" }, { "name": "HPSBST02372", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-052", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "name": "ADV-2008-2696", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "name": "1020834", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020834" }, { "name": "SSRT080133", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "oval:org.mitre.oval:def:6055", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6055" }, { "name": "20080909 Microsoft Windows GDI+ Gradient Fill Heap Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=743" }, { "name": "31018", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31018" }, { "name": "TA08-253A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2520", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2520" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2007-5348", "datePublished": "2008-09-10T15:00:00", "dateReserved": "2007-10-10T00:00:00", "dateUpdated": "2024-08-07T15:24:42.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1456
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/2353 | vdb-entry, x_refsource_VUPEN | |
http://www.us-cert.gov/cas/techalerts/TA08-225A.html | third-party-advisory, x_refsource_CERT | |
http://www.securitytracker.com/id?1020677 | vdb-entry, x_refsource_SECTRACK | |
http://marc.info/?l=bugtraq&m=121915960406986&w=2 | vendor-advisory, x_refsource_HP | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049 | vendor-advisory, x_refsource_MS | |
http://marc.info/?l=bugtraq&m=121915960406986&w=2 | vendor-advisory, x_refsource_HP | |
http://www.securityfocus.com/bid/30586 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/31417 | third-party-advisory, x_refsource_SECUNIA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5630 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:24:41.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-2353", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2353" }, { "name": "TA08-225A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "name": "1020677", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020677" }, { "name": "HPSBST02360", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "MS08-049", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049" }, { "name": "SSRT080117", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "30586", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30586" }, { "name": "31417", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31417" }, { "name": "oval:org.mitre.oval:def:5630", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5630" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Array index vulnerability in the Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote authenticated users to execute arbitrary code via a crafted event subscription request that is used to access an array of function pointers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "ADV-2008-2353", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2353" }, { "name": "TA08-225A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "name": "1020677", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020677" }, { "name": "HPSBST02360", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "MS08-049", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049" }, { "name": "SSRT080117", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "30586", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30586" }, { "name": "31417", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31417" }, { "name": "oval:org.mitre.oval:def:5630", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5630" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-1456", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Array index vulnerability in the Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote authenticated users to execute arbitrary code via a crafted event subscription request that is used to access an array of function pointers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-2353", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2353" }, { "name": "TA08-225A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html" }, { "name": "1020677", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020677" }, { "name": "HPSBST02360", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "MS08-049", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049" }, { "name": "SSRT080117", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121915960406986\u0026w=2" }, { "name": "30586", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30586" }, { "name": "31417", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31417" }, { "name": "oval:org.mitre.oval:def:5630", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5630" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-1456", "datePublished": "2008-08-13T10:00:00", "dateReserved": "2008-03-21T00:00:00", "dateUpdated": "2024-08-07T08:24:41.824Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-2253
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/2522 | vdb-entry, x_refsource_VUPEN | |
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=766863#PRODUCTS | x_refsource_CONFIRM | |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor-advisory, x_refsource_HP | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-054 | vendor-advisory, x_refsource_MS | |
http://www.securityfocus.com/bid/30550 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor-advisory, x_refsource_HP | |
http://www.securitytracker.com/id?1020831 | vdb-entry, x_refsource_SECTRACK | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5615 | vdb-entry, signature, x_refsource_OVAL | |
http://www.us-cert.gov/cas/techalerts/TA08-253A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:58:01.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-2522", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2522" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=766863#PRODUCTS" }, { "name": "HPSBST02372", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-054", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-054" }, { "name": "30550", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30550" }, { "name": "SSRT080133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "1020831", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020831" }, { "name": "oval:org.mitre.oval:def:5615", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5615" }, { "name": "TA08-253A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Microsoft Windows Media Player 11 allows remote attackers to execute arbitrary code via a crafted audio-only file that is streamed from a Server-Side Playlist (SSPL) on Windows Media Server, aka \"Windows Media Player Sampling Rate Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "ADV-2008-2522", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2522" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=766863#PRODUCTS" }, { "name": "HPSBST02372", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-054", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-054" }, { "name": "30550", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30550" }, { "name": "SSRT080133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "1020831", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020831" }, { "name": "oval:org.mitre.oval:def:5615", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5615" }, { "name": "TA08-253A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-2253", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Microsoft Windows Media Player 11 allows remote attackers to execute arbitrary code via a crafted audio-only file that is streamed from a Server-Side Playlist (SSPL) on Windows Media Server, aka \"Windows Media Player Sampling Rate Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-2522", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2522" }, { "name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=766863#PRODUCTS", "refsource": "CONFIRM", "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=766863#PRODUCTS" }, { "name": "HPSBST02372", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-054", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-054" }, { "name": "30550", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30550" }, { "name": "SSRT080133", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "1020831", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020831" }, { "name": "oval:org.mitre.oval:def:5615", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5615" }, { "name": "TA08-253A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-2253", "datePublished": "2008-09-10T15:00:00", "dateReserved": "2008-05-16T00:00:00", "dateUpdated": "2024-08-07T08:58:01.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3012
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/32154 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor-advisory, x_refsource_HP | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 | vendor-advisory, x_refsource_MS | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6040 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2008/2696 | vdb-entry, x_refsource_VUPEN | |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor-advisory, x_refsource_HP | |
http://www.securitytracker.com/id?1020835 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/31019 | vdb-entry, x_refsource_BID | |
http://www.us-cert.gov/cas/techalerts/TA08-253A.html | third-party-advisory, x_refsource_CERT | |
http://www.vupen.com/english/advisories/2008/2520 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:21:34.935Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32154", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32154" }, { "name": "HPSBST02372", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-052", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "name": "oval:org.mitre.oval:def:6040", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6040" }, { "name": "ADV-2008-2696", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "name": "SSRT080133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "1020835", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020835" }, { "name": "31019", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31019" }, { "name": "TA08-253A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2520", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2520" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka \"GDI+ EMF Memory Corruption Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "32154", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32154" }, { "name": "HPSBST02372", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-052", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "name": "oval:org.mitre.oval:def:6040", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6040" }, { "name": "ADV-2008-2696", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "name": "SSRT080133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "1020835", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020835" }, { "name": "31019", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31019" }, { "name": "TA08-253A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2520", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2520" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-3012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka \"GDI+ EMF Memory Corruption Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "32154", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32154" }, { "name": "HPSBST02372", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "MS08-052", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052" }, { "name": "oval:org.mitre.oval:def:6040", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6040" }, { "name": "ADV-2008-2696", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2696" }, { "name": "SSRT080133", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "1020835", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020835" }, { "name": "31019", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31019" }, { "name": "TA08-253A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2520", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2520" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-3012", "datePublished": "2008-09-10T15:00:00", "dateReserved": "2008-07-07T00:00:00", "dateUpdated": "2024-08-07T09:21:34.935Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/996227 | third-party-advisory, x_refsource_CERT-VN | |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor-advisory, x_refsource_HP | |
http://www.securitytracker.com/id?1020832 | vdb-entry, x_refsource_SECTRACK | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6018 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/bid/31065 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor-advisory, x_refsource_HP | |
https://www.exploit-db.com/exploits/6454 | exploit, x_refsource_EXPLOIT-DB | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053 | vendor-advisory, x_refsource_MS | |
http://www.us-cert.gov/cas/techalerts/TA08-253A.html | third-party-advisory, x_refsource_CERT | |
http://www.vupen.com/english/advisories/2008/2521 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:21:34.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#996227", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/996227" }, { "name": "HPSBST02372", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "1020832", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020832" }, { "name": "oval:org.mitre.oval:def:6018", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6018" }, { "name": "31065", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31065" }, { "name": "SSRT080133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "6454", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6454" }, { "name": "MS08-053", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053" }, { "name": "TA08-253A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2521", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2521" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka \"Windows Media Encoder Buffer Overrun Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "VU#996227", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/996227" }, { "name": "HPSBST02372", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "1020832", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020832" }, { "name": "oval:org.mitre.oval:def:6018", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6018" }, { "name": "31065", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31065" }, { "name": "SSRT080133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "6454", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6454" }, { "name": "MS08-053", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053" }, { "name": "TA08-253A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2521", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2521" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-3008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka \"Windows Media Encoder Buffer Overrun Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#996227", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/996227" }, { "name": "HPSBST02372", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "1020832", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020832" }, { "name": "oval:org.mitre.oval:def:6018", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6018" }, { "name": "31065", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31065" }, { "name": "SSRT080133", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=122235754013992\u0026w=2" }, { "name": "6454", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6454" }, { "name": "MS08-053", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053" }, { "name": "TA08-253A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-253A.html" }, { "name": "ADV-2008-2521", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2521" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-3008", "datePublished": "2008-09-10T15:00:00", "dateReserved": "2008-07-07T00:00:00", "dateUpdated": "2024-08-07T09:21:34.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-200803-0243
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in Apple Safari before 3.1, when running on Windows XP or Vista, allows remote attackers to inject arbitrary web script or HTML via a crafted URL that is not properly handled in the error page. Apple Safari is prone to 12 security vulnerabilities. Attackers may exploit these issues to execute arbitrary code, steal cookie-based authentication credentials, spoof secure websites, obtain sensitive information, and crash the affected application. Other attacks are also possible. NOTE: This BID is being retired. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of another site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. NOTE: This vulnerability was previously covered in BID 28290 (Apple Safari Prior to 3.1 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. Safari is the WEB browser bundled with the Apple family operating system by default. If users are tricked into opening malicious URLs, sensitive information may be leaked
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200803-0243", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.4" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.3" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "version" }, { "model": "safari", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.1" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0.4" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0.3" }, { "model": "safari beta", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0.3" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0.2" }, { "model": "safari beta", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0.2" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0.1" }, { "model": "safari beta", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.3.1" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.3" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.2.3" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.2.2" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.2" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.1" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.0" }, { "model": "safari beta", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3" }, { "model": "safari beta", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3" }, { "model": "safari", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "3.1" }, { "model": "windows vista", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": null }, { "model": "windows xp", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": null }, { "model": "windows-nt", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "xp" }, { "model": "windows-nt", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "vista" } ], "sources": [ { "db": "BID", "id": "28290" }, { "db": "BID", "id": "28321" }, { "db": "JVNDB", "id": "JVNDB-2008-001187" }, { "db": "NVD", "id": "CVE-2008-1001" }, { "db": "CNNVD", "id": "CNNVD-200803-298" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2008-1001" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Robert Swiecki robert@swiecki.netAdam BarthCollin Jackson collinj@cs.stanford.eduEric SeidelTavis Ormandy taviso@gentoo.orgWill Drewry wad@google.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200803-298" } ], "trust": 0.6 }, "cve": "CVE-2008-1001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2008-1001", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-31126", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2008-1001", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200803-298", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-31126", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-31126" }, { "db": "JVNDB", "id": "JVNDB-2008-001187" }, { "db": "NVD", "id": "CVE-2008-1001" }, { "db": "CNNVD", "id": "CNNVD-200803-298" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in Apple Safari before 3.1, when running on Windows XP or Vista, allows remote attackers to inject arbitrary web script or HTML via a crafted URL that is not properly handled in the error page. Apple Safari is prone to 12 security vulnerabilities. \nAttackers may exploit these issues to execute arbitrary code, steal cookie-based authentication credentials, spoof secure websites, obtain sensitive information, and crash the affected application. Other attacks are also possible. \nNOTE: This BID is being retired. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of another site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. \nNOTE: This vulnerability was previously covered in BID 28290 (Apple Safari Prior to 3.1 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. Safari is the WEB browser bundled with the Apple family operating system by default. If users are tricked into opening malicious URLs, sensitive information may be leaked", "sources": [ { "db": "NVD", "id": "CVE-2008-1001" }, { "db": "JVNDB", "id": "JVNDB-2008-001187" }, { "db": "BID", "id": "28290" }, { "db": "BID", "id": "28321" }, { "db": "VULHUB", "id": "VHN-31126" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "28321", "trust": 2.8 }, { "db": "BID", "id": "28290", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2008-1001", "trust": 2.8 }, { "db": "SECTRACK", "id": "1019653", "trust": 2.5 }, { "db": "USCERT", "id": "TA08-079A", "trust": 2.5 }, { "db": "VUPEN", "id": "ADV-2008-0920", "trust": 1.7 }, { "db": "USCERT", "id": "SA08-079A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2008-001187", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200803-298", "trust": 0.7 }, { "db": "CERT/CC", "id": "TA08-079A", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2008-03-18", "trust": 0.6 }, { "db": "XF", "id": "41333", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-31126", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-31126" }, { "db": "BID", "id": "28290" }, { "db": "BID", "id": "28321" }, { "db": "JVNDB", "id": "JVNDB-2008-001187" }, { "db": "NVD", "id": "CVE-2008-1001" }, { "db": "CNNVD", "id": "CNNVD-200803-298" } ] }, "id": "VAR-200803-0243", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-31126" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T10:59:16.214000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Safari 3.1", "trust": 0.8, "url": "http://support.apple.com/kb/ht1315" }, { "title": "Safari 3.1", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=307563-ja" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001187" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-31126" }, { "db": "JVNDB", "id": "JVNDB-2008-001187" }, { "db": "NVD", "id": "CVE-2008-1001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/28290" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/28321" }, { "trust": 2.5, "url": "http://www.us-cert.gov/cas/techalerts/ta08-079a.html" }, { "trust": 2.5, "url": "http://www.securitytracker.com/id?1019653" }, { "trust": 2.3, "url": "http://docs.info.apple.com/article.html?artnum=307563" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2008/mar/msg00000.html" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2008/0920/references" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/0920/references" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41333" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1001" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta08-079a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta08-079a/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1001" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa08-079a.html" }, { "trust": 0.6, "url": "http://www.apple.com/safari/" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/41333" } ], "sources": [ { "db": "VULHUB", "id": "VHN-31126" }, { "db": "BID", "id": "28290" }, { "db": "BID", "id": "28321" }, { "db": "JVNDB", "id": "JVNDB-2008-001187" }, { "db": "NVD", "id": "CVE-2008-1001" }, { "db": "CNNVD", "id": "CNNVD-200803-298" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-31126" }, { "db": "BID", "id": "28290" }, { "db": "BID", "id": "28321" }, { "db": "JVNDB", "id": "JVNDB-2008-001187" }, { "db": "NVD", "id": "CVE-2008-1001" }, { "db": "CNNVD", "id": "CNNVD-200803-298" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-03-19T00:00:00", "db": "VULHUB", "id": "VHN-31126" }, { "date": "2008-03-18T00:00:00", "db": "BID", "id": "28290" }, { "date": "2008-03-18T00:00:00", "db": "BID", "id": "28321" }, { "date": "2008-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001187" }, { "date": "2008-03-19T00:44:00", "db": "NVD", "id": "CVE-2008-1001" }, { "date": "2008-03-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200803-298" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-31126" }, { "date": "2008-03-20T20:40:00", "db": "BID", "id": "28290" }, { "date": "2008-03-20T16:00:00", "db": "BID", "id": "28321" }, { "date": "2008-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001187" }, { "date": "2018-10-30T16:25:38.340000", "db": "NVD", "id": "CVE-2008-1001" }, { "date": "2008-10-11T00:00:00", "db": "CNNVD", "id": "CNNVD-200803-298" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "28290" }, { "db": "BID", "id": "28321" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Windows XP and Vista Under the environment Apple Safari Vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001187" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-200803-298" } ], "trust": 0.6 } }
var-200803-0457
Vulnerability from variot
The cpoint.sys driver in Panda Internet Security 2008 and Antivirus+ Firewall 2008 allows local users to cause a denial of service (system crash or kernel panic), overwrite memory, or execute arbitrary code via a crafted IOCTL request that triggers an out-of-bounds write of kernel memory. Panda Internet Security/Antivirus+Firewall 2008 is prone to a vulnerability that allows local attackers to corrupt kernel memory. This vulnerability occurs because the application fails to sufficiently validate IOCTL requests. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: Panda Products cpoint.sys Privilege Escalation Vulnerabilities
SECUNIA ADVISORY ID: SA29311
VERIFY ADVISORY: http://secunia.com/advisories/29311/
CRITICAL: Less critical
IMPACT: Privilege escalation, DoS
WHERE: Local system
SOFTWARE: Panda Internet Security 2008 http://secunia.com/product/17681/ Panda Antivirus + Firewall 2008 http://secunia.com/product/17905/
DESCRIPTION: Tobias Klein has reported some vulnerabilities in Panda products, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.
Input validation errors in the cpoint.sys driver when handling certain IOCTL requests (e.g.
The vulnerabilities affect the following products: * Panda Internet Security 2008 * Panda Antivirus + Firewall 2008
SOLUTION: Apply hotfix.
Panda Internet Security 2008 (hfp120801s1.exe): http://www.pandasecurity.com/resources/sop/Platinum2008/hfp120801s1.exe
Panda Antivirus + Firewall 2008 (hft70801s1.exe): http://www.pandasecurity.com/resources/sop/PAVF08/hft70801s1.exe
PROVIDED AND/OR DISCOVERED BY: Tobias Klein
ORIGINAL ADVISORY: Panda: http://www.pandasecurity.com/homeusers/support/card?id=41337&idIdioma=2&ref=ProdExp http://www.pandasecurity.com/homeusers/support/card?id=41231&idIdioma=2&ref=ProdExp
http://www.trapkit.de/advisories/TKADV2008-001.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200803-0457", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "internet security", "scope": "eq", "trust": 1.3, "vendor": "panda", "version": "2008" }, { "model": "antivirus and firewall", "scope": "eq", "trust": 1.0, "vendor": "panda", "version": "2008" }, { "model": "antivirus and firewall", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "2008" }, { "model": "internet security", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "2008" }, { "model": "windows-nt", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "xp" }, { "model": "windows 2000", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "pro" }, { "model": "windows-nt", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "vista" }, { "model": "windows vista", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "x64" }, { "model": "windows xp", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "x64" }, { "model": "antivirus firewall", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "+2008" } ], "sources": [ { "db": "BID", "id": "28150" }, { "db": "JVNDB", "id": "JVNDB-2008-004255" }, { "db": "NVD", "id": "CVE-2008-1471" }, { "db": "CNNVD", "id": "CNNVD-200803-380" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_2000:*:*:pro:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows-nt:vista:*:x32:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows-nt:xp:*:x32:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:panda:panda_antivirus_and_firewall:2008:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:panda:panda_internet_security:2008:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2008-1471" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovery is credited to Tobias Klein.", "sources": [ { "db": "BID", "id": "28150" }, { "db": "CNNVD", "id": "CNNVD-200803-380" } ], "trust": 0.9 }, "cve": "CVE-2008-1471", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2008-1471", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-31596", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2008-1471", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200803-380", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-31596", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-31596" }, { "db": "JVNDB", "id": "JVNDB-2008-004255" }, { "db": "NVD", "id": "CVE-2008-1471" }, { "db": "CNNVD", "id": "CNNVD-200803-380" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The cpoint.sys driver in Panda Internet Security 2008 and Antivirus+ Firewall 2008 allows local users to cause a denial of service (system crash or kernel panic), overwrite memory, or execute arbitrary code via a crafted IOCTL request that triggers an out-of-bounds write of kernel memory. Panda Internet Security/Antivirus+Firewall 2008 is prone to a vulnerability that allows local attackers to corrupt kernel memory. This vulnerability occurs because the application fails to sufficiently validate IOCTL requests. ----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nPanda Products cpoint.sys Privilege Escalation Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA29311\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/29311/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nPrivilege escalation, DoS\n\nWHERE:\nLocal system\n\nSOFTWARE:\nPanda Internet Security 2008\nhttp://secunia.com/product/17681/\nPanda Antivirus + Firewall 2008\nhttp://secunia.com/product/17905/\n\nDESCRIPTION:\nTobias Klein has reported some vulnerabilities in Panda products,\nwhich can be exploited by malicious, local users to cause a DoS\n(Denial of Service) or gain escalated privileges. \n\nInput validation errors in the cpoint.sys driver when handling\ncertain IOCTL requests (e.g. \n\nThe vulnerabilities affect the following products:\n* Panda Internet Security 2008\n* Panda Antivirus + Firewall 2008\n\nSOLUTION:\nApply hotfix. \n\nPanda Internet Security 2008 (hfp120801s1.exe):\nhttp://www.pandasecurity.com/resources/sop/Platinum2008/hfp120801s1.exe\n\nPanda Antivirus + Firewall 2008 (hft70801s1.exe):\nhttp://www.pandasecurity.com/resources/sop/PAVF08/hft70801s1.exe\n\nPROVIDED AND/OR DISCOVERED BY:\nTobias Klein\n\nORIGINAL ADVISORY:\nPanda:\nhttp://www.pandasecurity.com/homeusers/support/card?id=41337\u0026idIdioma=2\u0026ref=ProdExp\nhttp://www.pandasecurity.com/homeusers/support/card?id=41231\u0026idIdioma=2\u0026ref=ProdExp\n\nhttp://www.trapkit.de/advisories/TKADV2008-001.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-1471" }, { "db": "JVNDB", "id": "JVNDB-2008-004255" }, { "db": "BID", "id": "28150" }, { "db": "VULHUB", "id": "VHN-31596" }, { "db": "PACKETSTORM", "id": "64344" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-31596", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-31596" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-1471", "trust": 2.8 }, { "db": "BID", "id": "28150", "trust": 2.0 }, { "db": "SECUNIA", "id": "29311", "trust": 1.8 }, { "db": "SECTRACK", "id": "1019568", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-0801", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2008-004255", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200803-380", "trust": 0.7 }, { "db": "XF", "id": "41079", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080308 [TKADV2008-001] PANDA INTERNET SECURITY/ANTIVIRUS+FIREWALL 2008 CPOINT.SYS KERNEL DRIVER MEMORY CORRUPTION VULNERABILITY", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "31363", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-31596", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "64344", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-31596" }, { "db": "BID", "id": "28150" }, { "db": "JVNDB", "id": "JVNDB-2008-004255" }, { "db": "PACKETSTORM", "id": "64344" }, { "db": "NVD", "id": "CVE-2008-1471" }, { "db": "CNNVD", "id": "CNNVD-200803-380" } ] }, "id": "VAR-200803-0457", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-31596" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:06:40.865000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "20080306 41337 EN", "trust": 0.8, "url": "http://www.pandasecurity.com/homeusers/support/card?id=41337\u0026ididioma=2\u0026ref=prodexp" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-004255" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-31596" }, { "db": "JVNDB", "id": "JVNDB-2008-004255" }, { "db": "NVD", "id": "CVE-2008-1471" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.trapkit.de/advisories/tkadv2008-001.txt" }, { "trust": 2.0, "url": "http://www.pandasecurity.com/homeusers/support/card?id=41231\u0026ididioma=2\u0026ref=prodexp" }, { "trust": 2.0, "url": "http://www.pandasecurity.com/homeusers/support/card?id=41337\u0026ididioma=2\u0026ref=prodexp" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/28150" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1019568" }, { "trust": 1.7, "url": "http://secunia.com/advisories/29311" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/489292/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/0801/references" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41079" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1471" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1471" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/41079" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/489292/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0801/references" }, { "trust": 0.1, "url": "http://www.pandasecurity.com/homeusers/support/card?id=41231\u0026amp;ididioma=2\u0026amp;ref=prodexp" }, { "trust": 0.1, "url": "http://www.pandasecurity.com/homeusers/support/card?id=41337\u0026amp;ididioma=2\u0026amp;ref=prodexp" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/17905/" }, { "trust": 0.1, "url": "http://www.pandasecurity.com/resources/sop/platinum2008/hfp120801s1.exe" }, { "trust": 0.1, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://www.pandasecurity.com/resources/sop/pavf08/hft70801s1.exe" }, { "trust": 0.1, "url": "http://secunia.com/product/17681/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/29311/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-31596" }, { "db": "BID", "id": "28150" }, { "db": "JVNDB", "id": "JVNDB-2008-004255" }, { "db": "PACKETSTORM", "id": "64344" }, { "db": "NVD", "id": "CVE-2008-1471" }, { "db": "CNNVD", "id": "CNNVD-200803-380" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-31596" }, { "db": "BID", "id": "28150" }, { "db": "JVNDB", "id": "JVNDB-2008-004255" }, { "db": "PACKETSTORM", "id": "64344" }, { "db": "NVD", "id": "CVE-2008-1471" }, { "db": "CNNVD", "id": "CNNVD-200803-380" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-03-24T00:00:00", "db": "VULHUB", "id": "VHN-31596" }, { "date": "2008-03-08T00:00:00", "db": "BID", "id": "28150" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-004255" }, { "date": "2008-03-12T17:55:23", "db": "PACKETSTORM", "id": "64344" }, { "date": "2008-03-24T22:44:00", "db": "NVD", "id": "CVE-2008-1471" }, { "date": "2008-03-24T00:00:00", "db": "CNNVD", "id": "CNNVD-200803-380" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-11T00:00:00", "db": "VULHUB", "id": "VHN-31596" }, { "date": "2015-05-07T17:32:00", "db": "BID", "id": "28150" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-004255" }, { "date": "2018-10-11T20:34:56.347000", "db": "NVD", "id": "CVE-2008-1471" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200803-380" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "28150" }, { "db": "PACKETSTORM", "id": "64344" }, { "db": "CNNVD", "id": "CNNVD-200803-380" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Panda Internet Security Such as cpoint.sys Service disruption in drivers (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-004255" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200803-380" } ], "trust": 0.6 } }
var-200804-0154
Vulnerability from variot
Unspecified vulnerability in Apple QuickTime Player on Windows XP SP2 and Vista SP1 allows remote attackers to execute arbitrary code via a crafted QuickTime media file. NOTE: as of 20080429, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. Apple QuickTime is prone to an unspecified remote code-execution vulnerability. Very few technical details are currently available. We will update this BID as more information emerges. Successful exploits can allow remote attackers to execute arbitrary code in the context of the user running the application. This may facilitate a compromise of affected computers. This issue affects QuickTime 7.4 for Microsoft Windows XP and Vista; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200804-0154", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "*" }, { "model": "quicktime", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "windows", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "vista sp11" }, { "model": "windows xp", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "sp3 sp2" }, { "model": "windows vista", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": null }, { "model": "windows-nt", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "vista" }, { "model": "windows xp", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "sp2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4" } ], "sources": [ { "db": "BID", "id": "28959" }, { "db": "JVNDB", "id": "JVNDB-2008-003018" }, { "db": "NVD", "id": "CVE-2008-2010" }, { "db": "CNNVD", "id": "CNNVD-200804-428" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2008-2010" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "pdp from GNUCITIZEN", "sources": [ { "db": "BID", "id": "28959" }, { "db": "CNNVD", "id": "CNNVD-200804-428" } ], "trust": 0.9 }, "cve": "CVE-2008-2010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2008-2010", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-32135", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2008-2010", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200804-428", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-32135", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-32135" }, { "db": "JVNDB", "id": "JVNDB-2008-003018" }, { "db": "NVD", "id": "CVE-2008-2010" }, { "db": "CNNVD", "id": "CNNVD-200804-428" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in Apple QuickTime Player on Windows XP SP2 and Vista SP1 allows remote attackers to execute arbitrary code via a crafted QuickTime media file. NOTE: as of 20080429, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. Apple QuickTime is prone to an unspecified remote code-execution vulnerability. \nVery few technical details are currently available. We will update this BID as more information emerges. \nSuccessful exploits can allow remote attackers to execute arbitrary code in the context of the user running the application. This may facilitate a compromise of affected computers. \nThis issue affects QuickTime 7.4 for Microsoft Windows XP and Vista; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2008-2010" }, { "db": "JVNDB", "id": "JVNDB-2008-003018" }, { "db": "BID", "id": "28959" }, { "db": "VULHUB", "id": "VHN-32135" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-2010", "trust": 2.8 }, { "db": "BID", "id": "28959", "trust": 2.0 }, { "db": "SECTRACK", "id": "1019950", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2008-003018", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200804-428", "trust": 0.7 }, { "db": "XF", "id": "42098", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-32135", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-32135" }, { "db": "BID", "id": "28959" }, { "db": "JVNDB", "id": "JVNDB-2008-003018" }, { "db": "NVD", "id": "CVE-2008-2010" }, { "db": "CNNVD", "id": "CNNVD-200804-428" } ] }, "id": "VAR-200804-0154", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-32135" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:52:59.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.apple.com/quicktime/" }, { "title": "Top Page", "trust": 0.8, "url": "http://windows.microsoft.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-003018" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2008-2010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www.gnucitizen.org/blog/quicktime-0day-for-vista-and-xp/" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/28959" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1019950" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42098" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2010" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-2010" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/42098" }, { "trust": 0.3, "url": "http://www.apple.com/quicktime/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-32135" }, { "db": "BID", "id": "28959" }, { "db": "JVNDB", "id": "JVNDB-2008-003018" }, { "db": "NVD", "id": "CVE-2008-2010" }, { "db": "CNNVD", "id": "CNNVD-200804-428" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-32135" }, { "db": "BID", "id": "28959" }, { "db": "JVNDB", "id": "JVNDB-2008-003018" }, { "db": "NVD", "id": "CVE-2008-2010" }, { "db": "CNNVD", "id": "CNNVD-200804-428" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-04-30T00:00:00", "db": "VULHUB", "id": "VHN-32135" }, { "date": "2008-04-28T00:00:00", "db": "BID", "id": "28959" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-003018" }, { "date": "2008-04-30T00:10:00", "db": "NVD", "id": "CVE-2008-2010" }, { "date": "2008-04-29T00:00:00", "db": "CNNVD", "id": "CNNVD-200804-428" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-32135" }, { "date": "2008-04-30T17:26:00", "db": "BID", "id": "28959" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-003018" }, { "date": "2018-10-30T16:25:57.280000", "db": "NVD", "id": "CVE-2008-2010" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200804-428" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200804-428" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Windows XP and Vista of Apple QuickTime Player Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-003018" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-200804-428" } ], "trust": 0.6 } }