Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.102025
Kategorie:Mac OS X Local Security Checks
Titel:Mac OS X Security Update 2008-007
Zusammenfassung:The remote host is missing Security Update 2008-007.
Beschreibung:Summary:
The remote host is missing Security Update 2008-007.

Affected Software/OS:
One or more of the following components are affected:

Apache

Certificates

ClamAV

ColorSync

CUPS

Finder

launchd

libxslt

MySQL Server

Networking

PHP

Postfix

PSNormalizer

QuickLook

rlogin

Script Editor

Single Sign-On

Tomcat

vim

Weblog

Solution:
Update your Mac OS X operating system. Please see the references for more information.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-6420
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
BugTraq ID: 27236
http://www.securityfocus.com/bid/27236
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
Bugtraq: 20080110 SecurityReason - Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/486169/100/0/threaded
Bugtraq: 20080729 rPSA-2008-0236-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/494858/100/0/threaded
http://security.gentoo.org/glsa/glsa-200807-06.xml
HPdes Security Advisory: HPSBUX02401
http://marc.info/?l=bugtraq&m=123376588623823&w=2
HPdes Security Advisory: SSRT090005
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371
http://www.redhat.com/support/errata/RHSA-2008-0966.html
http://secunia.com/advisories/31026
http://secunia.com/advisories/32222
http://secunia.com/advisories/33797
http://secunia.com/advisories/34219
http://securityreason.com/securityalert/3523
SuSE Security Announcement: SUSE-SR:2008:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html
http://www.ubuntu.com/usn/USN-731-1
http://www.vupen.com/english/advisories/2008/2780
http://www.vupen.com/english/advisories/2009/0320
Common Vulnerability Exposure (CVE) ID: CVE-2008-1678
31026
31416
http://secunia.com/advisories/31416
31681
31692
http://www.securityfocus.com/bid/31692
32222
34219
35264
http://secunia.com/advisories/35264
38761
http://secunia.com/advisories/38761
3981
http://securityreason.com/securityalert/3981
42724
http://secunia.com/advisories/42724
42733
http://secunia.com/advisories/42733
44183
http://secunia.com/advisories/44183
ADV-2008-2780
APPLE-SA-2008-10-09
FEDORA-2008-6393
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html
GLSA-200807-06
MDVSA-2009:124
http://www.mandriva.com/security/advisories?name=MDVSA-2009:124
RHSA-2009:1075
http://www.redhat.com/support/errata/RHSA-2009-1075.html
SSA:2010-060-02
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049
SUSE-SR:2008:024
USN-731-1
[openssl-dev] 20080512 possible memory leak in zlib compression
http://marc.info/?l=openssl-dev&m=121060672602371&w=2
http://bugs.gentoo.org/show_bug.cgi?id=222643
http://support.apple.com/kb/HT3216
http://svn.apache.org/viewvc?view=rev&revision=654119
https://bugs.edge.launchpad.net/bugs/186339
https://bugs.edge.launchpad.net/bugs/224945
https://bugzilla.redhat.com/show_bug.cgi?id=447268
https://issues.apache.org/bugzilla/show_bug.cgi?id=44975
https://kb.bluecoat.com/index?page=content&id=SA50
openssl-libssl-dos(43948)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43948
oval:org.mitre.oval:def:9754
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9754
Common Vulnerability Exposure (CVE) ID: CVE-2008-2364
1020267
http://www.securitytracker.com/id?1020267
20080729 rPSA-2008-0236-1 httpd mod_ssl
20081122 rPSA-2008-0328-1 httpd mod_ssl
http://www.securityfocus.com/archive/1/498567/100/0/threaded
247666
http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1
29653
http://www.securityfocus.com/bid/29653
30621
http://secunia.com/advisories/30621
31404
http://secunia.com/advisories/31404
31651
http://secunia.com/advisories/31651
31904
http://secunia.com/advisories/31904
32685
http://secunia.com/advisories/32685
32838
http://secunia.com/advisories/32838
33156
http://secunia.com/advisories/33156
33797
34259
http://secunia.com/advisories/34259
34418
http://secunia.com/advisories/34418
ADV-2008-1798
http://www.vupen.com/english/advisories/2008/1798
ADV-2009-0320
FEDORA-2008-6314
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00153.html
HPSBUX02365
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
HPSBUX02401
HPSBUX02465
http://marc.info/?l=bugtraq&m=125631037611762&w=2
MDVSA-2008:195
http://www.mandriva.com/security/advisories?name=MDVSA-2008:195
MDVSA-2008:237
http://www.mandriva.com/security/advisories?name=MDVSA-2008:237
PK67579
http://www-1.ibm.com/support/docview.wss?uid=swg1PK67579
RHSA-2008:0966
RHSA-2008:0967
http://rhn.redhat.com/errata/RHSA-2008-0967.html
SSRT080118
SSRT090005
SSRT090192
SUSE-SR:2009:006
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
SUSE-SR:2009:007
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210422 svn commit: r1074079 [2/3] - in /websites/staging/httpd/trunk/content: ./ apreq/ contribute/ contributors/ dev/ docs-project/ docs/ info/ mod_fcgid/ mod_ftp/ mod_mbox/ mod_smtpd/ modules/ security/ test/ test/flood/
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
apache-modproxy-module-dos(42987)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42987
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=666154&r2=666153&pathrev=666154
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328
http://www-01.ibm.com/support/docview.wss?uid=swg27008517
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
oval:org.mitre.oval:def:11713
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11713
oval:org.mitre.oval:def:6084
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6084
oval:org.mitre.oval:def:9577
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9577
Common Vulnerability Exposure (CVE) ID: CVE-2008-1389
BugTraq ID: 30994
http://www.securityfocus.com/bid/30994
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html
http://security.gentoo.org/glsa/glsa-200809-18.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:189
http://int21.de/cve/CVE-2008-1389-clamav-chd.html
http://www.securitytracker.com/id?1020805
http://secunia.com/advisories/31725
http://secunia.com/advisories/31906
http://secunia.com/advisories/31982
http://secunia.com/advisories/32030
http://secunia.com/advisories/32699
SuSE Security Announcement: SUSE-SR:2008:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
http://www.vupen.com/english/advisories/2008/2484
http://www.vupen.com/english/advisories/2008/2564
Common Vulnerability Exposure (CVE) ID: CVE-2008-3912
BugTraq ID: 31051
http://www.securityfocus.com/bid/31051
Debian Security Information: DSA-1660 (Google Search)
http://www.debian.org/security/2008/dsa-1660
https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1141
http://www.openwall.com/lists/oss-security/2008/09/03/2
http://www.openwall.com/lists/oss-security/2008/09/04/13
http://www.securitytracker.com/id?1020828
http://secunia.com/advisories/32424
XForce ISS Database: clamav-libclamav-dos(45056)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45056
Common Vulnerability Exposure (CVE) ID: CVE-2008-3913
XForce ISS Database: clamav-manager-dos(45057)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45057
Common Vulnerability Exposure (CVE) ID: CVE-2008-3914
XForce ISS Database: clamav-multiple-unspecified(45058)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45058
Common Vulnerability Exposure (CVE) ID: CVE-2008-3642
http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
BugTraq ID: 31715
http://www.securityfocus.com/bid/31715
http://www.securitytracker.com/id?1021023
http://secunia.com/advisories/32706
XForce ISS Database: macosx-colorsync-bo(45778)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45778
Common Vulnerability Exposure (CVE) ID: CVE-2008-3641
BugTraq ID: 31688
http://www.securityfocus.com/bid/31688
Bugtraq: 20081010 ZDI-08-067: Apple CUPS 1.3.7 (HP-GL/2 filter) Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/497221/100/0/threaded
Debian Security Information: DSA-1656 (Google Search)
http://www.debian.org/security/2008/dsa-1656
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00331.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00380.html
http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:211
http://www.zerodayinitiative.com/advisories/ZDI-08-067
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9666
http://www.redhat.com/support/errata/RHSA-2008-0937.html
http://www.securitytracker.com/id?1021031
http://secunia.com/advisories/32084
http://secunia.com/advisories/32226
http://secunia.com/advisories/32284
http://secunia.com/advisories/32292
http://secunia.com/advisories/32316
http://secunia.com/advisories/32331
http://secunia.com/advisories/33085
http://secunia.com/advisories/33111
http://secunia.com/advisories/33568
http://sunsolve.sun.com/search/document.do?assetkey=1-26-261088-1
SuSE Security Announcement: SUSE-SR:2008:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
https://usn.ubuntu.com/656-1/
http://www.vupen.com/english/advisories/2008/2782
http://www.vupen.com/english/advisories/2008/3401
http://www.vupen.com/english/advisories/2009/1568
XForce ISS Database: cups-hpgl-code-execution(45779)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45779
Common Vulnerability Exposure (CVE) ID: CVE-2008-3643
BugTraq ID: 31720
http://www.securityfocus.com/bid/31720
http://www.securitytracker.com/id?1021024
XForce ISS Database: macosx-finder-dos(45780)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45780
Common Vulnerability Exposure (CVE) ID: CVE-2008-1767
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
BugTraq ID: 29312
http://www.securityfocus.com/bid/29312
Debian Security Information: DSA-1589 (Google Search)
http://www.debian.org/security/2008/dsa-1589
http://security.gentoo.org/glsa/glsa-200806-02.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:151
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9785
http://www.redhat.com/support/errata/RHSA-2008-0287.html
http://www.securitytracker.com/id?1020071
http://secunia.com/advisories/30315
http://secunia.com/advisories/30323
http://secunia.com/advisories/30393
http://secunia.com/advisories/30521
http://secunia.com/advisories/30717
http://secunia.com/advisories/31074
http://secunia.com/advisories/31363
SuSE Security Announcement: SUSE-SR:2008:013 (Google Search)
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.ubuntu.com/usn/usn-633-1
http://www.vupen.com/english/advisories/2008/1580/references
http://www.vupen.com/english/advisories/2008/2094/references
XForce ISS Database: libxslt-xsl-bo(42560)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42560
Common Vulnerability Exposure (CVE) ID: CVE-2007-2691
BugTraq ID: 24016
http://www.securityfocus.com/bid/24016
Bugtraq: 20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server (Google Search)
http://www.securityfocus.com/archive/1/473874/100/0/threaded
Debian Security Information: DSA-1413 (Google Search)
http://www.debian.org/security/2007/dsa-1413
http://www.mandriva.com/security/advisories?name=MDKSA-2007:139
http://bugs.mysql.com/bug.php?id=27515
http://lists.mysql.com/announce/470
http://osvdb.org/34766
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559
http://www.redhat.com/support/errata/RHSA-2007-0894.html
http://www.redhat.com/support/errata/RHSA-2008-0364.html
http://www.redhat.com/support/errata/RHSA-2008-0768.html
http://www.securitytracker.com/id?1018069
http://secunia.com/advisories/25301
http://secunia.com/advisories/25946
http://secunia.com/advisories/26073
http://secunia.com/advisories/26430
http://secunia.com/advisories/27155
http://secunia.com/advisories/27823
http://secunia.com/advisories/28838
http://secunia.com/advisories/30351
http://secunia.com/advisories/31226
SuSE Security Announcement: SUSE-SR:2008:003 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
https://usn.ubuntu.com/528-1/
http://www.vupen.com/english/advisories/2007/1804
XForce ISS Database: mysql-renametable-weak-security(34347)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34347
Common Vulnerability Exposure (CVE) ID: CVE-2007-5969
BugTraq ID: 26765
http://www.securityfocus.com/bid/26765
Bugtraq: 20080117 rPSA-2008-0018-1 mysql mysql-bench mysql-server (Google Search)
http://www.securityfocus.com/archive/1/486477/100/0/threaded
Debian Security Information: DSA-1451 (Google Search)
http://www.debian.org/security/2008/dsa-1451
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html
http://security.gentoo.org/glsa/glsa-200804-04.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:243
http://lists.mysql.com/announce/495
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10509
http://www.redhat.com/support/errata/RHSA-2007-1155.html
http://www.redhat.com/support/errata/RHSA-2007-1157.html
http://www.securitytracker.com/id?1019060
http://secunia.com/advisories/27981
http://secunia.com/advisories/28025
http://secunia.com/advisories/28040
http://secunia.com/advisories/28063
http://secunia.com/advisories/28099
http://secunia.com/advisories/28108
http://secunia.com/advisories/28128
http://secunia.com/advisories/28343
http://secunia.com/advisories/28559
http://secunia.com/advisories/29706
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959
https://usn.ubuntu.com/559-1/
http://www.vupen.com/english/advisories/2007/4142
http://www.vupen.com/english/advisories/2007/4198
http://www.vupen.com/english/advisories/2008/0560/references
http://www.vupen.com/english/advisories/2008/1000/references
Common Vulnerability Exposure (CVE) ID: CVE-2008-0226
BugTraq ID: 27140
http://www.securityfocus.com/bid/27140
Bugtraq: 20080104 Multiple vulnerabilities in yaSSL 1.7.5 (Google Search)
http://www.securityfocus.com/archive/1/485810/100/0/threaded
Bugtraq: 20080104 Pre-auth buffer-overflow in mySQL through yaSSL (Google Search)
http://www.securityfocus.com/archive/1/485811/100/0/threaded
Debian Security Information: DSA-1478 (Google Search)
http://www.debian.org/security/2008/dsa-1478
http://www.mandriva.com/security/advisories?name=MDVSA-2008:150
http://secunia.com/advisories/28324
http://secunia.com/advisories/28419
http://secunia.com/advisories/28597
http://secunia.com/advisories/29443
http://securityreason.com/securityalert/3531
http://www.ubuntu.com/usn/usn-588-1
XForce ISS Database: yassl-inputbufferoperator-bo(39431)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39431
XForce ISS Database: yassl-processoldclienthello-bo(39429)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39429
Common Vulnerability Exposure (CVE) ID: CVE-2008-0227
XForce ISS Database: yassl-hashwithtransformupdate-dos(39433)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39433
Common Vulnerability Exposure (CVE) ID: CVE-2008-2079
1019995
http://www.securitytracker.com/id?1019995
29106
http://www.securityfocus.com/bid/29106
30134
http://secunia.com/advisories/30134
31066
http://secunia.com/advisories/31066
31226
31687
http://secunia.com/advisories/31687
32769
http://secunia.com/advisories/32769
36566
http://secunia.com/advisories/36566
36701
http://secunia.com/advisories/36701
ADV-2008-1472
http://www.vupen.com/english/advisories/2008/1472/references
APPLE-SA-2009-09-10-2
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
DSA-1608
http://www.debian.org/security/2008/dsa-1608
MDVSA-2008:149
http://www.mandriva.com/security/advisories?name=MDVSA-2008:149
MDVSA-2008:150
RHSA-2008:0505
http://www.redhat.com/support/errata/RHSA-2008-0505.html
RHSA-2008:0510
http://www.redhat.com/support/errata/RHSA-2008-0510.html
RHSA-2008:0768
RHSA-2009:1289
http://www.redhat.com/support/errata/RHSA-2009-1289.html
SUSE-SR:2008:017
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
USN-671-1
http://www.ubuntu.com/usn/USN-671-1
http://bugs.mysql.com/bug.php?id=32167
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html
http://support.apple.com/kb/HT3865
mysql-myisam-security-bypass(42267)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42267
oval:org.mitre.oval:def:10133
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133
Common Vulnerability Exposure (CVE) ID: CVE-2008-3645
BugTraq ID: 31711
http://www.securityfocus.com/bid/31711
http://www.securitytracker.com/id?1021025
XForce ISS Database: macosx-eapolcontroller-bo(45781)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45781
Common Vulnerability Exposure (CVE) ID: CVE-2007-4850
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
BugTraq ID: 27413
http://www.securityfocus.com/bid/27413
BugTraq ID: 29009
http://www.securityfocus.com/bid/29009
Bugtraq: 20080122 PHP 5.2.5 cURL safe_mode bypass (Google Search)
http://www.securityfocus.com/archive/1/486856/100/0/threaded
Bugtraq: 20080527 rPSA-2008-0178-1 php php-mysql php-pgsql (Google Search)
http://www.securityfocus.com/archive/1/492671/100/0/threaded
http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
http://www.openwall.com/lists/oss-security/2008/05/02/2
http://secunia.com/advisories/30048
http://secunia.com/advisories/30411
http://secunia.com/advisories/31200
http://secunia.com/advisories/31326
http://securityreason.com/securityalert/3562
http://securityreason.com/achievement_securityalert/51
http://www.ubuntu.com/usn/usn-628-1
http://www.vupen.com/english/advisories/2008/1412
http://www.vupen.com/english/advisories/2008/2268
XForce ISS Database: php-curlinit-security-bypass(39852)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39852
XForce ISS Database: php-safemode-directive-security-bypass(42134)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42134
Common Vulnerability Exposure (CVE) ID: CVE-2008-0674
http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
BugTraq ID: 27786
http://www.securityfocus.com/bid/27786
Bugtraq: 20080228 rPSA-2008-0086-1 pcre (Google Search)
http://www.securityfocus.com/archive/1/488927/100/0/threaded
Bugtraq: 20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl (Google Search)
http://www.securityfocus.com/archive/1/492535/100/0/threaded
Cert/CC Advisory: TA09-218A
http://www.us-cert.gov/cas/techalerts/TA09-218A.html
Debian Security Information: DSA-1499 (Google Search)
http://www.debian.org/security/2008/dsa-1499
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00371.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00632.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html
http://security.gentoo.org/glsa/glsa-200803-24.xml
http://security.gentoo.org/glsa/glsa-200811-05.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:053
http://www.securitytracker.com/id?1022674
http://secunia.com/advisories/28923
http://secunia.com/advisories/28957
http://secunia.com/advisories/28960
http://secunia.com/advisories/28985
http://secunia.com/advisories/28996
http://secunia.com/advisories/29027
http://secunia.com/advisories/29048
http://secunia.com/advisories/29175
http://secunia.com/advisories/29267
http://secunia.com/advisories/29282
http://secunia.com/advisories/30345
http://secunia.com/advisories/32746
http://secunia.com/advisories/36096
SuSE Security Announcement: SUSE-SR:2008:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
https://usn.ubuntu.com/581-1/
http://www.vupen.com/english/advisories/2008/0570
http://www.vupen.com/english/advisories/2008/0592
http://www.vupen.com/english/advisories/2009/2172
XForce ISS Database: pcre-characterclass-bo(40505)
https://exchange.xforce.ibmcloud.com/vulnerabilities/40505
Common Vulnerability Exposure (CVE) ID: CVE-2008-2371
20081027 rPSA-2008-0305-1 pcre
http://www.securityfocus.com/archive/1/497828/100/0/threaded
30087
http://www.securityfocus.com/bid/30087
30916
http://secunia.com/advisories/30916
30944
http://secunia.com/advisories/30944
30945
http://secunia.com/advisories/30945
30958
http://secunia.com/advisories/30958
30961
http://secunia.com/advisories/30961
30967
http://secunia.com/advisories/30967
30972
http://secunia.com/advisories/30972
30990
http://secunia.com/advisories/30990
31200
32454
http://secunia.com/advisories/32454
32746
35074
http://secunia.com/advisories/35074
35650
http://secunia.com/advisories/35650
39300
http://secunia.com/advisories/39300
ADV-2008-2005
http://www.vupen.com/english/advisories/2008/2005
ADV-2008-2006
http://www.vupen.com/english/advisories/2008/2006
ADV-2008-2336
http://www.vupen.com/english/advisories/2008/2336
ADV-2009-1297
http://www.vupen.com/english/advisories/2009/1297
ADV-2010-0833
http://www.vupen.com/english/advisories/2010/0833
APPLE-SA-2009-05-12
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
DSA-1602
http://www.debian.org/security/2008/dsa-1602
FEDORA-2008-6025
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html
FEDORA-2008-6048
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html
GLSA-200807-03
http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml
GLSA-200811-05
HPSBUX02431
http://marc.info/?l=bugtraq&m=124654546101607&w=2
MDVSA-2008:147
http://www.mandriva.com/security/advisories?name=MDVSA-2008:147
MDVSA-2009:023
SSRT090085
SUSE-SR:2008:014
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
USN-624-1
http://www.ubuntu.com/usn/usn-624-1
USN-624-2
http://ubuntu.com/usn/usn-624-2
USN-628-1
http://bugs.gentoo.org/show_bug.cgi?id=228091
http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes
http://support.apple.com/kb/HT3549
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305
Common Vulnerability Exposure (CVE) ID: CVE-2008-3646
BugTraq ID: 31721
http://www.securityfocus.com/bid/31721
XForce ISS Database: macosx-postfix-configfile-weak-security(45876)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45876
Common Vulnerability Exposure (CVE) ID: CVE-2008-3647
BugTraq ID: 31719
http://www.securityfocus.com/bid/31719
http://www.securitytracker.com/id?1021026
XForce ISS Database: macosx-psnormalizer-bo(45783)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45783
Common Vulnerability Exposure (CVE) ID: CVE-2008-4211
http://lists.apple.com/archives/security-announce/2008/Nov/msg00002.html
BugTraq ID: 31707
http://www.securityfocus.com/bid/31707
http://www.securitytracker.com/id?1021027
http://secunia.com/advisories/32756
http://www.vupen.com/english/advisories/2008/3232
XForce ISS Database: macosx-quicklook2-code-execution(45784)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45784
Common Vulnerability Exposure (CVE) ID: CVE-2008-4212
BugTraq ID: 31708
http://www.securityfocus.com/bid/31708
http://www.securitytracker.com/id?1021028
XForce ISS Database: macosx-rlogin-weak-security(45785)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45785
Common Vulnerability Exposure (CVE) ID: CVE-2008-4214
BugTraq ID: 31716
http://www.securityfocus.com/bid/31716
http://www.securitytracker.com/id?1021029
XForce ISS Database: macosx-scripteditor-symlink(45786)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45786
Common Vulnerability Exposure (CVE) ID: CVE-2007-6286
Bugtraq: 20080208 [SECURITY] CVE-2007-6286: Tomcat duplicate request processing vulnerability (Google Search)
http://www.securityfocus.com/archive/1/487823/100/0/threaded
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/507985/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html
http://security.gentoo.org/glsa/glsa-200804-10.xml
HPdes Security Advisory: HPSBST02955
http://marc.info/?l=bugtraq&m=139344343412337&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E
http://secunia.com/advisories/28878
http://secunia.com/advisories/28915
http://secunia.com/advisories/29711
http://secunia.com/advisories/30676
http://secunia.com/advisories/37460
http://secunia.com/advisories/57126
http://securityreason.com/securityalert/3637
SuSE Security Announcement: SUSE-SR:2009:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
http://www.vupen.com/english/advisories/2008/0488
http://www.vupen.com/english/advisories/2008/1856/references
http://www.vupen.com/english/advisories/2009/3316
Common Vulnerability Exposure (CVE) ID: CVE-2008-0002
BugTraq ID: 27703
http://www.securityfocus.com/bid/27703
Bugtraq: 20080208 CVE-2008-0002: Tomcat information disclosure vulnerability (Google Search)
http://www.securityfocus.com/archive/1/487812/100/0/threaded
http://secunia.com/advisories/28834
http://securityreason.com/securityalert/3638
Common Vulnerability Exposure (CVE) ID: CVE-2008-1232
1020622
http://www.securitytracker.com/id?1020622
20080801 [CVE-2008-1232] Apache Tomcat XSS vulnerability
http://www.securityfocus.com/archive/1/495021/100/0/threaded
20090616 CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability
http://www.securityfocus.com/archive/1/504351/100/0/threaded
20090806 CA20090806-02: Security Notice for Unicenter Asset Portfolio Management, Unicenter Desktop and Server Management, Unicenter Patch Management
http://www.securityfocus.com/archive/1/505556/100/0/threaded
20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
30496
http://www.securityfocus.com/bid/30496
31379
http://secunia.com/advisories/31379
31381
http://secunia.com/advisories/31381
31639
http://secunia.com/advisories/31639
31865
http://secunia.com/advisories/31865
31891
http://secunia.com/advisories/31891
31982
32120
http://secunia.com/advisories/32120
32266
http://secunia.com/advisories/32266
33999
http://secunia.com/advisories/33999
34013
http://secunia.com/advisories/34013
35474
http://secunia.com/advisories/35474
36108
http://secunia.com/advisories/36108
37460
4098
http://securityreason.com/securityalert/4098
57126
ADV-2008-2305
http://www.vupen.com/english/advisories/2008/2305
ADV-2008-2823
http://www.vupen.com/english/advisories/2008/2823
ADV-2009-0503
http://www.vupen.com/english/advisories/2009/0503
ADV-2009-1609
http://www.vupen.com/english/advisories/2009/1609
ADV-2009-2194
http://www.vupen.com/english/advisories/2009/2194
ADV-2009-3316
FEDORA-2008-7977
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html
FEDORA-2008-8113
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html
FEDORA-2008-8130
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html
HPSBST02955
MDVSA-2008:188
http://www.mandriva.com/security/advisories?name=MDVSA-2008:188
RHSA-2008:0648
http://www.redhat.com/support/errata/RHSA-2008-0648.html
RHSA-2008:0862
http://www.redhat.com/support/errata/RHSA-2008-0862.html
RHSA-2008:0864
http://www.redhat.com/support/errata/RHSA-2008-0864.html
SUSE-SR:2008:018
SUSE-SR:2009:004
[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx
http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
http://tomcat.apache.org/security-4.html
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://www.vmware.com/security/advisories/VMSA-2009-0002.html
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095
oval:org.mitre.oval:def:11181
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181
oval:org.mitre.oval:def:5985
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5985
tomcat-httpservletresponse-xss(44155)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44155
Common Vulnerability Exposure (CVE) ID: CVE-2008-1947
1020624
http://www.securitytracker.com/id?1020624
20080602 [SECURITY] CVE-2008-1947: Tomcat host-manager XSS vulnerability
http://www.securityfocus.com/archive/1/492958/100/0/threaded
29502
http://www.securityfocus.com/bid/29502
30500
http://secunia.com/advisories/30500
30592
http://secunia.com/advisories/30592
ADV-2008-1725
http://www.vupen.com/english/advisories/2008/1725
DSA-1593
http://www.debian.org/security/2008/dsa-1593
[tomcat-user] 20080602 [SECURITY] CVE-2008-1947: Tomcat host-manager XSS vulnerability
http://marc.info/?l=tomcat-user&m=121244319501278&w=2
apache-tomcat-hostmanager-xss(42816)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42816
oval:org.mitre.oval:def:11534
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11534
oval:org.mitre.oval:def:6009
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6009
Common Vulnerability Exposure (CVE) ID: CVE-2008-2370
1020623
http://www.securitytracker.com/id?1020623
20080801 [CVE-2008-2370] Apache Tomcat information disclosure vulnerability
http://www.securityfocus.com/archive/1/495022/100/0/threaded
30494
http://www.securityfocus.com/bid/30494
35393
http://secunia.com/advisories/35393
36249
http://secunia.com/advisories/36249
4099
http://securityreason.com/securityalert/4099
ADV-2009-1535
http://www.vupen.com/english/advisories/2009/1535
ADV-2009-2215
http://www.vupen.com/english/advisories/2009/2215
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.html
oval:org.mitre.oval:def:10577
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10577
oval:org.mitre.oval:def:5876
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5876
tomcat-requestdispatcher-info-disclosure(44156)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44156
Common Vulnerability Exposure (CVE) ID: CVE-2008-2938
1020665
http://www.securitytracker.com/id?1020665
20080811 Apache Tomcat <= 6.0.18 UTF8 Directory Traversal Vulnerability
http://www.securityfocus.com/archive/1/495318/100/0/threaded
20091107 ToutVirtual VirtualIQ Multiple Vulnerabilities
http://www.securityfocus.com/archive/1/507729/100/0/threaded
30633
http://www.securityfocus.com/bid/30633
37297
http://secunia.com/advisories/37297
4148
http://securityreason.com/securityalert/4148
6229
https://www.exploit-db.com/exploits/6229
ADV-2008-2343
http://www.vupen.com/english/advisories/2008/2343
VU#343355
http://www.kb.cert.org/vuls/id/343355
http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt
oval:org.mitre.oval:def:10587
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10587
tomcat-allowlinking-utf8-directory-traversal(44411)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44411
Common Vulnerability Exposure (CVE) ID: CVE-2007-5333
20080208 [SECURITY] CVE-2007-5333: Tomcat Cookie handling vulnerabilities
http://www.securityfocus.com/archive/1/487822/100/0/threaded
27706
http://www.securityfocus.com/bid/27706
28878
28884
http://secunia.com/advisories/28884
28915
29711
30676
30802
http://secunia.com/advisories/30802
32036
http://secunia.com/advisories/32036
33330
http://secunia.com/advisories/33330
3636
http://securityreason.com/securityalert/3636
ADV-2008-0488
ADV-2008-1856
ADV-2008-1981
http://www.vupen.com/english/advisories/2008/1981/references
ADV-2008-2690
http://www.vupen.com/english/advisories/2008/2690
APPLE-SA-2008-06-30
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
FEDORA-2008-1467
FEDORA-2008-1603
GLSA-200804-10
IZ20133
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20133
IZ20991
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20991
JVN#09470767
http://jvn.jp/jp/JVN%2309470767/index.html
MDVSA-2009:018
http://www.mandriva.com/security/advisories?name=MDVSA-2009:018
MDVSA-2010:176
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
http://support.apple.com/kb/HT2163
http://www-01.ibm.com/support/docview.wss?uid=swg24018932
http://www-01.ibm.com/support/docview.wss?uid=swg27012047
http://www-01.ibm.com/support/docview.wss?uid=swg27012048
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html
http://www.vmware.com/security/advisories/VMSA-2008-0010.html
https://bugzilla.redhat.com/show_bug.cgi?id=532111
oval:org.mitre.oval:def:11177
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11177
Common Vulnerability Exposure (CVE) ID: CVE-2007-5342
20071223 [CVE-2007-5342] Apache Tomcat's default security policy is too open
http://www.securityfocus.com/archive/1/485481/100/0/threaded
27006
http://www.securityfocus.com/bid/27006
28274
http://secunia.com/advisories/28274
28317
http://secunia.com/advisories/28317
29313
http://secunia.com/advisories/29313
3485
http://securityreason.com/securityalert/3485
39833
http://osvdb.org/39833
ADV-2008-0013
http://www.vupen.com/english/advisories/2008/0013
DSA-1447
http://www.debian.org/security/2008/dsa-1447
RHSA-2008:0042
http://www.redhat.com/support/errata/RHSA-2008-0042.html
RHSA-2008:0195
http://www.redhat.com/support/errata/RHSA-2008-0195.html
RHSA-2008:0831
http://www.redhat.com/support/errata/RHSA-2008-0831.html
RHSA-2008:0832
http://www.redhat.com/support/errata/RHSA-2008-0832.html
RHSA-2008:0833
http://www.redhat.com/support/errata/RHSA-2008-0833.html
RHSA-2008:0834
http://www.redhat.com/support/errata/RHSA-2008-0834.html
apache-juli-logging-weak-security(39201)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39201
http://svn.apache.org/viewvc?view=rev&revision=606594
oval:org.mitre.oval:def:10417
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417
Common Vulnerability Exposure (CVE) ID: CVE-2007-5461
BugTraq ID: 26070
http://www.securityfocus.com/bid/26070
Debian Security Information: DSA-1447 (Google Search)
Debian Security Information: DSA-1453 (Google Search)
http://www.debian.org/security/2008/dsa-1453
https://www.exploit-db.com/exploits/4530
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
http://marc.info/?l=full-disclosure&m=119239530508382
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
http://issues.apache.org/jira/browse/GERONIMO-3549
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E
http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705@apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9202
http://www.redhat.com/support/errata/RHSA-2008-0261.html
RedHat Security Advisories: RHSA-2008:0630
http://rhn.redhat.com/errata/RHSA-2008-0630.html
http://www.securitytracker.com/id?1018864
http://secunia.com/advisories/27398
http://secunia.com/advisories/27446
http://secunia.com/advisories/27481
http://secunia.com/advisories/27727
http://secunia.com/advisories/28361
http://secunia.com/advisories/29242
http://secunia.com/advisories/30899
http://secunia.com/advisories/30908
http://secunia.com/advisories/31493
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
SuSE Security Announcement: SUSE-SR:2008:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
http://www.vupen.com/english/advisories/2007/3622
http://www.vupen.com/english/advisories/2007/3671
http://www.vupen.com/english/advisories/2007/3674
http://www.vupen.com/english/advisories/2008/1979/references
XForce ISS Database: apache-tomcat-webdav-dir-traversal(37243)
https://exchange.xforce.ibmcloud.com/vulnerabilities/37243
Common Vulnerability Exposure (CVE) ID: CVE-2008-2712
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
BugTraq ID: 29715
http://www.securityfocus.com/bid/29715
Bugtraq: 20080613 Collection of Vulnerabilities in Fully Patched Vim 7.1 (Google Search)
http://www.securityfocus.com/archive/1/493352/100/0/threaded
Bugtraq: 20080701 Re: Collection of Vulnerabilities in Fully Patched Vim 7.1 (Google Search)
http://www.securityfocus.com/archive/1/493353/100/0/threaded
http://marc.info/?l=bugtraq&m=121494431426308&w=2
Bugtraq: 20080811 rPSA-2008-0247-1 gvim vim vim-minimal (Google Search)
http://www.securityfocus.com/archive/1/495319/100/0/threaded
Bugtraq: 20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim (Google Search)
http://www.securityfocus.com/archive/1/502322/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.rdancer.org/vulnerablevim.html
http://www.openwall.com/lists/oss-security/2008/06/16/2
http://www.openwall.com/lists/oss-security/2008/10/15/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11109
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6238
http://www.redhat.com/support/errata/RHSA-2008-0580.html
http://www.redhat.com/support/errata/RHSA-2008-0617.html
http://www.redhat.com/support/errata/RHSA-2008-0618.html
http://www.securitytracker.com/id?1020293
http://secunia.com/advisories/30731
http://secunia.com/advisories/32858
http://secunia.com/advisories/32864
http://secunia.com/advisories/33410
http://securityreason.com/securityalert/3951
SuSE Security Announcement: SUSE-SR:2009:007 (Google Search)
http://www.ubuntu.com/usn/USN-712-1
http://www.vupen.com/english/advisories/2008/1851/references
http://www.vupen.com/english/advisories/2009/0033
http://www.vupen.com/english/advisories/2009/0904
XForce ISS Database: vim-scripts-command-execution(43083)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43083
Common Vulnerability Exposure (CVE) ID: CVE-2008-4101
BugTraq ID: 30795
http://www.securityfocus.com/bid/30795
Bugtraq: 20080822 Vim: Arbitrary Code Execution in Commands: K, Control-], g] (Google Search)
http://www.securityfocus.com/archive/1/495662
Bugtraq: 20080825 RE: Arbitrary Code Execution in Commands: K, Control-], g] (Google Search)
http://www.securityfocus.com/archive/1/495703
http://groups.google.com/group/vim_dev/attach/9290f26f9bc11b33/K-arbitrary-command-execution.patch.v3?part=2
http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2
http://groups.google.com/group/vim_dev/browse_thread/thread/1434d0812b5c817e/6ad2d5b50a96668e
http://www.rdancer.org/vulnerablevim-K.html
http://www.openwall.com/lists/oss-security/2008/09/11/4
http://www.openwall.com/lists/oss-security/2008/09/11/3
http://www.openwall.com/lists/oss-security/2008/09/16/5
http://www.openwall.com/lists/oss-security/2008/09/16/6
http://ftp.vim.org/pub/vim/patches/7.2/7.2.010
http://groups.google.com/group/vim_dev/msg/9290f26f9bc11b33
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10894
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5812
http://secunia.com/advisories/31592
XForce ISS Database: vim-normal-command-execution(44626)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44626
Common Vulnerability Exposure (CVE) ID: CVE-2008-3432
20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim
30648
http://www.securityfocus.com/bid/30648
32858
33410
ADV-2009-0033
ADV-2009-0904
RHSA-2008:0617
[oss-security] 20080715 Re: Re: More arbitrary code executions in Netrw
http://www.openwall.com/lists/oss-security/2008/07/15/4
[oss-security] 20080731 Re: Re: More arbitrary code executions in Netrw
http://www.openwall.com/lists/oss-security/2008/08/01/1
ftp://ftp.vim.org/pub/vim/patches/6.2.429
ftp://ftp.vim.org/pub/vim/patches/6.3/6.3.059
http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm
http://www.vmware.com/security/advisories/VMSA-2009-0004.html
https://bugzilla.redhat.com/show_bug.cgi?id=455455
oval:org.mitre.oval:def:11203
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11203
oval:org.mitre.oval:def:5987
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5987
vim-mchexpandwildcards-bo(44722)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44722
Common Vulnerability Exposure (CVE) ID: CVE-2008-3294
Bugtraq: 20080717 Vim: Insecure Temporary File Creation During Build: Arbitrary Code Execution (Google Search)
http://www.securityfocus.com/archive/1/494532/100/0/threaded
Bugtraq: 20080718 Re: Vim: Insecure Temporary File Creation During Build: Arbitrary Code Execution (Google Search)
http://www.securityfocus.com/archive/1/494535/100/0/threaded
Bugtraq: 20080725 Re: [Full-disclosure] Vim: Insecure Temporary File Creation During Build: Arbitrary Code Execution (Google Search)
http://www.securityfocus.com/archive/1/494736/100/0/threaded
http://seclists.org/fulldisclosure/2008/Jul/0312.html
http://secunia.com/advisories/31159
http://www.vupen.com/english/advisories/2008/2146/references
Common Vulnerability Exposure (CVE) ID: CVE-2008-4215
BugTraq ID: 31718
http://www.securityfocus.com/bid/31718
http://www.securitytracker.com/id?1021030
XForce ISS Database: macosx-weblog-weak-security(45787)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45787
CopyrightCopyright (C) 2010 LSS

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.