Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.102031
Kategorie:Mac OS X Local Security Checks
Titel:Mac OS X 10.5.3 Update / Mac OS X Security Update 2008-003
Zusammenfassung:The remote host is missing Mac OS X 10.5.3 Update / Mac OS X Security Update 2008-003.
Beschreibung:Summary:
The remote host is missing Mac OS X 10.5.3 Update / Mac OS X Security Update 2008-003.

Affected Software/OS:
One or more of the following components are affected:

AFP Server

Apache

AppKit

Apple Pixlet Video

ATS

CFNetwork

CoreFoundation

CoreGraphics

CoreTypes

CUPS

Flash Player Plug-in

Help Viewer

iCal

International Components for Unicode

Image Capture

Image Capture

ImageIO

Kernel

LoginWindow

Mail

ruby

Single Sign-On

Wiki Server

Solution:
Update your Mac OS X operating system. Please see the references for more information.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-1027
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
BugTraq ID: 29412
http://www.securityfocus.com/bid/29412
BugTraq ID: 29490
http://www.securityfocus.com/bid/29490
Cert/CC Advisory: TA08-150A
http://www.us-cert.gov/cas/techalerts/TA08-150A.html
http://securitytracker.com/id?1020130
http://secunia.com/advisories/30430
http://www.vupen.com/english/advisories/2008/1697
XForce ISS Database: macosx-afpserver-security-bypass(42703)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42703
Common Vulnerability Exposure (CVE) ID: CVE-2005-3352
AIX APAR: PK16139
http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only
AIX APAR: PK25355
http://www-1.ibm.com/support/search.wss?rs=0&q=PK25355&apar=only
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 15834
http://www.securityfocus.com/bid/15834
Debian Security Information: DSA-1167 (Google Search)
http://www.debian.org/security/2006/dsa-1167
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00060.html
http://www.securityfocus.com/archive/1/425399/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200602-03.xml
HPdes Security Advisory: HPSBMA02328
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01428449
HPdes Security Advisory: HPSBOV02683
http://marc.info/?l=bugtraq&m=130497311408250&w=2
HPdes Security Advisory: HPSBUX02145
http://www.securityfocus.com/archive/1/445206/100/0/threaded
HPdes Security Advisory: HPSBUX02164
http://www.securityfocus.com/archive/1/450321/100/0/threaded
HPdes Security Advisory: HPSBUX02172
http://www.securityfocus.com/archive/1/450315/100/0/threaded
HPdes Security Advisory: SSRT061202
HPdes Security Advisory: SSRT061265
HPdes Security Advisory: SSRT061269
HPdes Security Advisory: SSRT071293
HPdes Security Advisory: SSRT090208
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:007
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
http://www.openpkg.org/security/OpenPKG-SA-2005.029-apache.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10480
http://www.redhat.com/support/errata/RHSA-2006-0158.html
RedHat Security Advisories: RHSA-2006:0159
http://rhn.redhat.com/errata/RHSA-2006-0159.html
RedHat Security Advisories: RHSA-2006:0692
http://rhn.redhat.com/errata/RHSA-2006-0692.html
http://securitytracker.com/id?1015344
http://secunia.com/advisories/17319
http://secunia.com/advisories/18008
http://secunia.com/advisories/18333
http://secunia.com/advisories/18339
http://secunia.com/advisories/18340
http://secunia.com/advisories/18429
http://secunia.com/advisories/18517
http://secunia.com/advisories/18526
http://secunia.com/advisories/18585
http://secunia.com/advisories/18743
http://secunia.com/advisories/19012
http://secunia.com/advisories/20046
http://secunia.com/advisories/20670
http://secunia.com/advisories/21744
http://secunia.com/advisories/22140
http://secunia.com/advisories/22368
http://secunia.com/advisories/22388
http://secunia.com/advisories/22669
http://secunia.com/advisories/23260
http://secunia.com/advisories/25239
http://secunia.com/advisories/29420
http://secunia.com/advisories/29849
SGI Security Advisory: 20060101-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.685483
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.470158
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102662-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102663-1
SuSE Security Announcement: SUSE-SA:2006:043 (Google Search)
http://www.novell.com/linux/security/advisories/2006_43_apache.html
SuSE Security Announcement: SUSE-SR:2006:004 (Google Search)
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
SuSE Security Announcement: SUSE-SR:2007:011 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-May/0005.html
http://www.trustix.org/errata/2005/0074/
http://www.ubuntulinux.org/usn/usn-241-1
http://www.vupen.com/english/advisories/2005/2870
http://www.vupen.com/english/advisories/2006/2423
http://www.vupen.com/english/advisories/2006/3995
http://www.vupen.com/english/advisories/2006/4015
http://www.vupen.com/english/advisories/2006/4300
http://www.vupen.com/english/advisories/2006/4868
http://www.vupen.com/english/advisories/2008/0924/references
http://www.vupen.com/english/advisories/2008/1246/references
Common Vulnerability Exposure (CVE) ID: CVE-2005-3357
1015447
http://securitytracker.com/id?1015447
102640
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102640-1
102662
16152
http://www.securityfocus.com/bid/16152
18307
http://secunia.com/advisories/18307
18333
18339
18340
18429
18517
18585
18743
19012
20060101-01-U
21848
http://secunia.com/advisories/21848
22233
http://secunia.com/advisories/22233
22368
22523
http://secunia.com/advisories/22523
22669
22992
http://secunia.com/advisories/22992
23260
29849
30430
ADV-2006-0056
http://www.vupen.com/english/advisories/2006/0056
ADV-2006-3920
http://www.vupen.com/english/advisories/2006/3920
ADV-2006-3995
ADV-2006-4207
http://www.vupen.com/english/advisories/2006/4207
ADV-2006-4300
ADV-2006-4868
ADV-2008-1246
ADV-2008-1697
APPLE-SA-2008-05-28
FEDORA-2006-052
FLSA-2006:175406
GLSA-200602-03
HPSBMA02328
HPSBOV02683
HPSBUX02145
HPSBUX02172
RHSA-2006:0159
SSRT061202
SSRT061269
SSRT071293
SSRT090208
SUSE-SR:2006:004
SuSE-SA:2006:051
https://lists.opensuse.org/opensuse-security-announce/2006-09/msg00016.html
TA08-150A
TSLSA-2005-0074
USN-241-1
[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
http://issues.apache.org/bugzilla/show_bug.cgi?id=37791
http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm
http://svn.apache.org/viewcvs?rev=358026&view=rev
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
oval:org.mitre.oval:def:11467
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11467
Common Vulnerability Exposure (CVE) ID: CVE-2006-3747
1016601
http://securitytracker.com/id?1016601
102663
1312
http://securityreason.com/securityalert/1312
19204
http://www.securityfocus.com/bid/19204
2006-0044
http://lwn.net/Alerts/194228/
20060728 Apache 1.3.29/2.X mod_rewrite Buffer Overflow Vulnerability CVE-2006-3747
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/048267.html
20060728 Apache mod_rewrite Buffer Overflow Vulnerability
http://www.securityfocus.com/archive/1/441487/100/0/threaded
20060728 [Announcement] Apache HTTP Server 2.2.3 (2.0.59, 1.3.37) Released
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/048271.html
http://www.securityfocus.com/archive/1/441485/100/0/threaded
20060728 rPSA-2006-0139-1 httpd mod_ssl
http://www.securityfocus.com/archive/1/441526/100/200/threaded
20060820 POC & exploit for Apache mod_rewrite off-by-one
http://www.securityfocus.com/archive/1/443870/100/0/threaded
21197
http://secunia.com/advisories/21197
21241
http://secunia.com/advisories/21241
21245
http://secunia.com/advisories/21245
21247
http://secunia.com/advisories/21247
21266
http://secunia.com/advisories/21266
21273
http://secunia.com/advisories/21273
21284
http://secunia.com/advisories/21284
21307
http://secunia.com/advisories/21307
21313
http://secunia.com/advisories/21313
21315
http://secunia.com/advisories/21315
21346
http://secunia.com/advisories/21346
21478
http://secunia.com/advisories/21478
21509
http://secunia.com/advisories/21509
22262
http://secunia.com/advisories/22262
22388
23028
http://secunia.com/advisories/23028
26329
http://secunia.com/advisories/26329
27588
http://www.osvdb.org/27588
29420
ADV-2006-3017
http://www.vupen.com/english/advisories/2006/3017
ADV-2006-3264
http://www.vupen.com/english/advisories/2006/3264
ADV-2006-3282
http://www.vupen.com/english/advisories/2006/3282
ADV-2006-3884
http://www.vupen.com/english/advisories/2006/3884
ADV-2006-4015
ADV-2007-2783
http://www.vupen.com/english/advisories/2007/2783
ADV-2008-0924
APPLE-SA-2008-03-18
DSA-1131
http://www.debian.org/security/2006/dsa-1131
DSA-1132
http://www.debian.org/security/2006/dsa-1132
GLSA-200608-01
http://security.gentoo.org/glsa/glsa-200608-01.xml
HPSBMA02250
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
HPSBUX02164
MDKSA-2006:133
http://www.mandriva.com/security/advisories?name=MDKSA-2006:133
OpenPKG-SA-2006.015
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.015-apache.html
PK27875
http://www-1.ibm.com/support/docview.wss?uid=swg24013080
PK29154
http://www-1.ibm.com/support/docview.wss?uid=swg1PK29154
PK29156
http://www-1.ibm.com/support/docview.wss?uid=swg1PK29156
SSRT061265
SSRT061275
SUSE-SA:2006:043
USN-328-1
http://www.ubuntu.com/usn/usn-328-1
VU#395412
http://www.kb.cert.org/vuls/id/395412
[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
apache-modrewrite-offbyone-bo(28063)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28063
http://docs.info.apple.com/article.html?artnum=307562
http://kbase.redhat.com/faq/FAQ_68_8653.shtm
http://svn.apache.org/viewvc?view=rev&revision=426144
http://www-1.ibm.com/support/docview.wss?uid=swg27007951
http://www.apache.org/dist/httpd/Announcement2.0.html
https://issues.rpath.com/browse/RPL-538
Common Vulnerability Exposure (CVE) ID: CVE-2007-1863
1018303
http://www.securitytracker.com/id?1018303
2007-0026
http://www.trustix.org/errata/2007/0026/
20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server
http://www.securityfocus.com/archive/1/505990/100/0/threaded
24649
http://www.securityfocus.com/bid/24649
25830
http://secunia.com/advisories/25830
25873
http://secunia.com/advisories/25873
25920
http://secunia.com/advisories/25920
26273
http://secunia.com/advisories/26273
26443
http://secunia.com/advisories/26443
26508
http://secunia.com/advisories/26508
26822
http://secunia.com/advisories/26822
26842
http://secunia.com/advisories/26842
26993
http://secunia.com/advisories/26993
27037
http://secunia.com/advisories/27037
27563
http://secunia.com/advisories/27563
27732
http://secunia.com/advisories/27732
28606
http://secunia.com/advisories/28606
37079
http://osvdb.org/37079
ADV-2007-2727
http://www.vupen.com/english/advisories/2007/2727
ADV-2007-3283
http://www.vupen.com/english/advisories/2007/3283
ADV-2007-3386
http://www.vupen.com/english/advisories/2007/3386
ADV-2008-0233
http://www.vupen.com/english/advisories/2008/0233
FEDORA-2007-2214
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
GLSA-200711-06
http://security.gentoo.org/glsa/glsa-200711-06.xml
HPSBUX02262
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
MDKSA-2007:140
http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
MDKSA-2007:141
http://www.mandriva.com/security/advisories?name=MDKSA-2007:141
PK49355
http://www-1.ibm.com/support/docview.wss?uid=swg1PK49355
PK52702
http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
RHSA-2007:0533
https://rhn.redhat.com/errata/RHSA-2007-0533.html
RHSA-2007:0534
http://rhn.redhat.com/errata/RHSA-2007-0534.html
RHSA-2007:0556
http://rhn.redhat.com/errata/RHSA-2007-0556.html
RHSA-2007:0557
http://www.redhat.com/support/errata/RHSA-2007-0557.html
SSRT071447
SUSE-SA:2007:061
http://www.novell.com/linux/security/advisories/2007_61_apache2.html
USN-499-1
http://www.ubuntu.com/usn/usn-499-1
[httpd-cvs] 20210422 svn commit: r1074079 [2/3] - in /websites/staging/httpd/trunk/content: ./ apreq/ contribute/ contributors/ dev/ docs-project/ docs/ info/ mod_fcgid/ mod_ftp/ mod_mbox/ mod_smtpd/ modules/ security/ test/ test/flood/
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E
[security-announce] 20090820 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server
http://lists.vmware.com/pipermail/security-announce/2009/000062.html
http://bugs.gentoo.org/show_bug.cgi?id=186219
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244658
http://httpd.apache.org/security/vulnerabilities_20.html
http://httpd.apache.org/security/vulnerabilities_22.html
http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
http://svn.apache.org/viewvc?view=rev&revision=535617
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
https://issues.rpath.com/browse/RPL-1500
oval:org.mitre.oval:def:9824
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9824
Common Vulnerability Exposure (CVE) ID: CVE-2007-3847
1018633
http://www.securitytracker.com/id?1018633
25489
http://www.securityfocus.com/bid/25489
26636
http://secunia.com/advisories/26636
26722
http://secunia.com/advisories/26722
26790
http://secunia.com/advisories/26790
26952
http://secunia.com/advisories/26952
27209
http://secunia.com/advisories/27209
27593
http://secunia.com/advisories/27593
27882
http://secunia.com/advisories/27882
27971
http://secunia.com/advisories/27971
28467
http://secunia.com/advisories/28467
28749
http://secunia.com/advisories/28749
28922
http://secunia.com/advisories/28922
ADV-2007-3020
http://www.vupen.com/english/advisories/2007/3020
ADV-2007-3095
http://www.vupen.com/english/advisories/2007/3095
ADV-2007-3494
http://www.vupen.com/english/advisories/2007/3494
ADV-2007-3955
http://www.vupen.com/english/advisories/2007/3955
FEDORA-2007-707
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html
HPSBUX02273
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588
MDKSA-2007:235
http://www.mandriva.com/security/advisories?name=MDKSA-2007:235
PK50469
http://www-1.ibm.com/support/docview.wss?uid=swg1PK50469
RHSA-2007:0746
http://www.redhat.com/support/errata/RHSA-2007-0746.html
RHSA-2007:0747
http://www.redhat.com/support/errata/RHSA-2007-0747.html
RHSA-2007:0911
http://www.redhat.com/support/errata/RHSA-2007-0911.html
RHSA-2008:0005
http://www.redhat.com/support/errata/RHSA-2008-0005.html
SSA:2008-045-02
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.595748
SSRT071476
USN-575-1
http://www.ubuntu.com/usn/usn-575-1
[apache-cvs] 20070801 svn commit: r561616 - in /httpd/httpd/trunk: CHANGES
http://marc.info/?l=apache-cvs&m=118592992309395&w=2
[apache-httpd-dev] 20070801 Re: svn commit: r561616 - in /httpd/httpd/trunk: CHANGES modules/proxy/proxy_util.c
http://marc.info/?l=apache-httpd-dev&m=118595556504202&w=2
http://marc.info/?l=apache-httpd-dev&m=118595953217856&w=2
[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
http://support.avaya.com/elmodocs2/security/ASA-2007-500.htm
http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
https://issues.rpath.com/browse/RPL-1710
oval:org.mitre.oval:def:10525
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10525
Common Vulnerability Exposure (CVE) ID: CVE-2007-4465
BugTraq ID: 25653
http://www.securityfocus.com/bid/25653
Bugtraq: 20070912 Apache2 Undefined Charset UTF-7 XSS Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/479237/100/0/threaded
HPdes Security Advisory: HPSBUX02365
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
HPdes Security Advisory: HPSBUX02431
http://marc.info/?l=bugtraq&m=124654546101607&w=2
HPdes Security Advisory: HPSBUX02465
http://marc.info/?l=bugtraq&m=125631037611762&w=2
HPdes Security Advisory: SSRT080118
HPdes Security Advisory: SSRT090085
HPdes Security Advisory: SSRT090192
http://www.mandriva.com/security/advisories?name=MDVSA-2008:014
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089
http://www.redhat.com/support/errata/RHSA-2008-0004.html
http://www.redhat.com/support/errata/RHSA-2008-0006.html
http://www.redhat.com/support/errata/RHSA-2008-0008.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://securitytracker.com/id?1019194
http://secunia.com/advisories/28471
http://secunia.com/advisories/28607
http://secunia.com/advisories/31651
http://secunia.com/advisories/33105
http://secunia.com/advisories/35650
http://securityreason.com/securityalert/3113
http://securityreason.com/achievement_securityalert/46
SuSE Security Announcement: SUSE-SA:2007:061 (Google Search)
XForce ISS Database: apache-utf7-xss(36586)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36586
Common Vulnerability Exposure (CVE) ID: CVE-2007-5000
AIX APAR: PK58024
http://www-1.ibm.com/support/docview.wss?uid=swg1PK58024
AIX APAR: PK58074
http://www-1.ibm.com/support/docview.wss?uid=swg1PK58074
AIX APAR: PK63273
http://www-1.ibm.com/support/docview.wss?uid=swg1PK63273
AIX APAR: PK65782
http://www-1.ibm.com/support/docview.wss?uid=swg24019245
BugTraq ID: 26838
http://www.securityfocus.com/bid/26838
Bugtraq: 20080716 rPSA-2008-0035-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/494428/100/0/threaded
Bugtraq: 20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server (Google Search)
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00562.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00541.html
HPdes Security Advisory: HPSBMA02388
http://www.securityfocus.com/archive/1/498523/100/0/threaded
HPdes Security Advisory: HPSBUX02308
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
HPdes Security Advisory: SSRT080010
HPdes Security Advisory: SSRT080059
http://www.mandriva.com/security/advisories?name=MDVSA-2008:015
http://www.mandriva.com/security/advisories?name=MDVSA-2008:016
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
http://www.osvdb.org/39134
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9539
http://www.redhat.com/support/errata/RHSA-2008-0007.html
http://www.redhat.com/support/errata/RHSA-2008-0009.html
http://securitytracker.com/id?1019093
http://secunia.com/advisories/28046
http://secunia.com/advisories/28073
http://secunia.com/advisories/28081
http://secunia.com/advisories/28196
http://secunia.com/advisories/28375
http://secunia.com/advisories/28525
http://secunia.com/advisories/28526
http://secunia.com/advisories/28750
http://secunia.com/advisories/28977
http://secunia.com/advisories/29640
http://secunia.com/advisories/29806
http://secunia.com/advisories/29988
http://secunia.com/advisories/30356
http://secunia.com/advisories/30732
http://secunia.com/advisories/31142
http://secunia.com/advisories/32800
http://sunsolve.sun.com/search/document.do?assetkey=1-26-233623-1
SuSE Security Announcement: SUSE-SA:2008:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html
http://www.vupen.com/english/advisories/2007/4201
http://www.vupen.com/english/advisories/2007/4202
http://www.vupen.com/english/advisories/2007/4301
http://www.vupen.com/english/advisories/2008/0084
http://www.vupen.com/english/advisories/2008/0178
http://www.vupen.com/english/advisories/2008/0398
http://www.vupen.com/english/advisories/2008/0809/references
http://www.vupen.com/english/advisories/2008/1224/references
http://www.vupen.com/english/advisories/2008/1623/references
http://www.vupen.com/english/advisories/2008/1875/references
XForce ISS Database: apache-modimagemap-xss(39002)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39002
XForce ISS Database: apache-modimap-xss(39001)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39001
Common Vulnerability Exposure (CVE) ID: CVE-2007-6388
AIX APAR: PK59667
http://www-1.ibm.com/support/search.wss?rs=0&q=PK59667&apar=only
AIX APAR: PK62966
http://www-1.ibm.com/support/docview.wss?uid=swg1PK62966
BugTraq ID: 27237
http://www.securityfocus.com/bid/27237
HPdes Security Advisory: HPSBUX02313
http://www.securityfocus.com/archive/1/488082/100/0/threaded
HPdes Security Advisory: SSRT080015
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10272
http://securitytracker.com/id?1019154
http://secunia.com/advisories/28965
http://secunia.com/advisories/29504
http://secunia.com/advisories/33200
http://securityreason.com/securityalert/3541
http://www.vupen.com/english/advisories/2008/0047
http://www.vupen.com/english/advisories/2008/0447/references
http://www.vupen.com/english/advisories/2008/0554
http://www.vupen.com/english/advisories/2008/0986/references
XForce ISS Database: apache-status-page-xss(39472)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39472
Common Vulnerability Exposure (CVE) ID: CVE-2008-1028
BugTraq ID: 29487
http://www.securityfocus.com/bid/29487
http://securitytracker.com/id?1020131
XForce ISS Database: macosx-appkit-code-execution(42705)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42705
Common Vulnerability Exposure (CVE) ID: CVE-2008-1577
BugTraq ID: 29489
http://www.securityfocus.com/bid/29489
http://securitytracker.com/id?1020132
XForce ISS Database: macosx-pixlet-code-execution(42706)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42706
Common Vulnerability Exposure (CVE) ID: CVE-2008-1575
BugTraq ID: 29492
http://www.securityfocus.com/bid/29492
http://securitytracker.com/id?1020133
XForce ISS Database: macosx-ats-code-execution(42707)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42707
Common Vulnerability Exposure (CVE) ID: CVE-2008-1580
BugTraq ID: 29493
http://www.securityfocus.com/bid/29493
http://securitytracker.com/id?1020134
XForce ISS Database: macosx-cfnetwork-info-disclosure(42708)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42708
Common Vulnerability Exposure (CVE) ID: CVE-2008-1030
BugTraq ID: 29491
http://www.securityfocus.com/bid/29491
http://securitytracker.com/id?1020135
XForce ISS Database: macosx-corefoundation-cfdatareplacebytes-bo(42709)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42709
Common Vulnerability Exposure (CVE) ID: CVE-2008-1031
BugTraq ID: 29480
http://www.securityfocus.com/bid/29480
http://securitytracker.com/id?1020136
XForce ISS Database: macosx-coregraphics-unspec-code-execution(42710)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42710
Common Vulnerability Exposure (CVE) ID: CVE-2008-1032
BugTraq ID: 29481
http://www.securityfocus.com/bid/29481
http://securitytracker.com/id?1020137
XForce ISS Database: macosx-coretypes-weak-security(42711)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42711
Common Vulnerability Exposure (CVE) ID: CVE-2008-1033
BugTraq ID: 29484
http://www.securityfocus.com/bid/29484
http://securitytracker.com/id?1020145
XForce ISS Database: macosx-cups-info-disclosure(42713)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42713
Common Vulnerability Exposure (CVE) ID: CVE-2007-5275
BugTraq ID: 26930
http://www.securityfocus.com/bid/26930
Cert/CC Advisory: TA07-355A
http://www.us-cert.gov/cas/techalerts/TA07-355A.html
Cert/CC Advisory: TA08-100A
http://www.us-cert.gov/cas/techalerts/TA08-100A.html
http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml
http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml
http://crypto.stanford.edu/dns/dns-rebinding.pdf
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250
http://www.redhat.com/support/errata/RHSA-2007-1126.html
http://www.redhat.com/support/errata/RHSA-2008-0221.html
http://securitytracker.com/id?1019116
http://secunia.com/advisories/28157
http://secunia.com/advisories/28161
http://secunia.com/advisories/28213
http://secunia.com/advisories/28570
http://secunia.com/advisories/29763
http://secunia.com/advisories/29865
http://secunia.com/advisories/30507
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1
SuSE Security Announcement: SUSE-SA:2007:069 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html
SuSE Security Announcement: SUSE-SA:2008:022 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html
http://www.vupen.com/english/advisories/2007/4258
http://www.vupen.com/english/advisories/2008/1724/references
Common Vulnerability Exposure (CVE) ID: CVE-2007-6243
BugTraq ID: 26929
http://www.securityfocus.com/bid/26929
BugTraq ID: 26966
http://www.securityfocus.com/bid/26966
CERT/CC vulnerability note: VU#935737
http://www.kb.cert.org/vuls/id/935737
http://jvn.jp/jp/JVN%2345675516/index.html
http://www.adobe.com/devnet/flashplayer/articles/fplayer9_security.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11069
http://www.redhat.com/support/errata/RHSA-2008-0945.html
http://www.redhat.com/support/errata/RHSA-2008-0980.html
http://secunia.com/advisories/32448
http://secunia.com/advisories/32702
http://secunia.com/advisories/32759
http://secunia.com/advisories/33390
http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
SuSE Security Announcement: SUSE-SR:2008:025 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
XForce ISS Database: adobe-unspecified-security-bypass(39129)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39129
Common Vulnerability Exposure (CVE) ID: CVE-2007-6637
BugTraq ID: 27034
http://www.securityfocus.com/bid/27034
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9828
http://securitytracker.com/id?1019141
Common Vulnerability Exposure (CVE) ID: CVE-2007-6019
BugTraq ID: 28694
http://www.securityfocus.com/bid/28694
Bugtraq: 20080408 ZDI-08-021: Adobe Flash Player DeclareFunction2 Invalid Object Use Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/490623/100/0/threaded
Bugtraq: 20080414 Secunia Research: Adobe Flash Player "Declare Function (V7)" HeapOverflow (Google Search)
http://www.securityfocus.com/archive/1/490824/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-08-021
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10160
http://www.securitytracker.com/id?1019810
http://securityreason.com/securityalert/3805
XForce ISS Database: adobe-flash-declarefunction2-bo(41717)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41717
Common Vulnerability Exposure (CVE) ID: CVE-2007-0071
BugTraq ID: 28695
http://www.securityfocus.com/bid/28695
BugTraq ID: 29386
http://www.securityfocus.com/bid/29386
Cert/CC Advisory: TA08-149A
http://www.us-cert.gov/cas/techalerts/TA08-149A.html
CERT/CC vulnerability note: VU#159523
http://www.kb.cert.org/vuls/id/159523
CERT/CC vulnerability note: VU#395473
http://www.kb.cert.org/vuls/id/395473
ISS Security Advisory: 20080408 Adobe Flash Player Invalid Pointer Vulnerability
http://www.iss.net/threats/289.html
http://blogs.adobe.com/psirt/2008/05/potential_flash_player_issue.html
http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf
http://isc.sans.org/diary.html?storyid=4465
http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/
http://www.zerodayinitiative.com/advisories/ZDI-08-032/
http://www.osvdb.org/44282
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10379
http://www.securitytracker.com/id?1019811
http://www.securitytracker.com/id?1020114
http://secunia.com/advisories/30404
http://www.vupen.com/english/advisories/2008/1662/references
XForce ISS Database: multimedia-file-integer-overflow(37277)
https://exchange.xforce.ibmcloud.com/vulnerabilities/37277
Common Vulnerability Exposure (CVE) ID: CVE-2008-1655
BugTraq ID: 28697
http://www.securityfocus.com/bid/28697
http://www.adobe.com/devnet/flashplayer/articles/fplayer9_security.html#goal_dns
http://www.osvdb.org/44283
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10724
http://www.securitytracker.com/id?1019808
XForce ISS Database: adobe-flash-dnsrebinding-security-bypass(41807)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41807
Common Vulnerability Exposure (CVE) ID: CVE-2008-1654
BugTraq ID: 28696
http://www.securityfocus.com/bid/28696
Bugtraq: 20080113 Hacking The Interwebs (Google Search)
http://seclists.org/bugtraq/2008/Jan/0182.html
CERT/CC vulnerability note: VU#347812
http://www.kb.cert.org/vuls/id/347812
http://seclists.org/fulldisclosure/2008/Jan/0204.html
http://www.gnucitizen.org/blog/hacking-the-interwebs/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11435
http://www.securitytracker.com/id?1019807
XForce ISS Database: adobe-flash-navigatetourl-csrf(41718)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41718
Common Vulnerability Exposure (CVE) ID: CVE-2008-1034
BugTraq ID: 29483
http://www.securityfocus.com/bid/29483
CERT/CC vulnerability note: VU#566875
http://www.kb.cert.org/vuls/id/566875
http://securitytracker.com/id?1020138
XForce ISS Database: macosx-helpviewer-bo(42716)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42716
Common Vulnerability Exposure (CVE) ID: CVE-2008-1035
BugTraq ID: 28633
http://www.securityfocus.com/bid/28633
BugTraq ID: 29486
http://www.securityfocus.com/bid/29486
Bugtraq: 20080521 CORE-2008-0126: Multiple vulnerabilities in iCal (Google Search)
http://www.securityfocus.com/archive/1/492414/100/0/threaded
Bugtraq: 20080528 Re: CORE-2008-0126: Multiple vulnerabilities in iCal (Google Search)
http://www.securityfocus.com/archive/1/492638/100/100/threaded
http://www.securityfocus.com/archive/1/492682/100/0/threaded
http://www.coresecurity.com/?action=item&id=2219
http://www.securitytracker.com/id?1020095
http://www.vupen.com/english/advisories/2008/1601
Common Vulnerability Exposure (CVE) ID: CVE-2008-1036
BugTraq ID: 29488
http://www.securityfocus.com/bid/29488
Debian Security Information: DSA-1762 (Google Search)
http://www.debian.org/security/2009/dsa-1762
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824
http://www.redhat.com/support/errata/RHSA-2009-0296.html
http://securitytracker.com/id?1020139
http://secunia.com/advisories/34290
http://secunia.com/advisories/34777
http://www.ubuntu.com/usn/USN-747-1
XForce ISS Database: macosx-icu-security-bypass(42717)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42717
Common Vulnerability Exposure (CVE) ID: CVE-2008-1571
BugTraq ID: 29501
http://www.securityfocus.com/bid/29501
http://securitytracker.com/id?1020141
XForce ISS Database: macosx-imagecapture-directory-traversal(42718)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42718
Common Vulnerability Exposure (CVE) ID: CVE-2008-1572
BugTraq ID: 29521
http://www.securityfocus.com/bid/29521
XForce ISS Database: macosx-imagecapture-symlink(42719)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42719
Common Vulnerability Exposure (CVE) ID: CVE-2008-1573
http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html
BugTraq ID: 29513
http://www.securityfocus.com/bid/29513
http://securitytracker.com/id?1020144
http://secunia.com/advisories/30775
http://www.vupen.com/english/advisories/2008/1882/references
XForce ISS Database: macosx-imageio-information-disclosure(42721)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42721
Common Vulnerability Exposure (CVE) ID: CVE-2007-5266
BugTraq ID: 25957
http://www.securityfocus.com/bid/25957
Bugtraq: 20071112 FLEA-2007-0065-1 libpng (Google Search)
http://www.securityfocus.com/archive/1/483582/100/0/threaded
Bugtraq: 20080304 CORE-2008-0124: Multiple vulnerabilities in Google's Android SDK (Google Search)
http://www.securityfocus.com/archive/1/489135/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200711-08.xml
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:217
http://www.coresecurity.com/?action=item&id=2148
http://sourceforge.net/mailarchive/forum.php?thread_name=5122753600C3E94F87FBDFFCC090D1FF0400EA68%40MERCMBX07.na.sas.com&forum_name=png-mng-implement
http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0709140846k24e9a040r81623783b6b1c00f%40mail.gmail.com
http://secunia.com/advisories/27284
http://secunia.com/advisories/27529
http://secunia.com/advisories/27629
http://secunia.com/advisories/27746
http://secunia.com/advisories/30161
http://secunia.com/advisories/35302
http://secunia.com/advisories/35386
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.520323
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
http://www.vupen.com/english/advisories/2009/1462
http://www.vupen.com/english/advisories/2009/1560
Common Vulnerability Exposure (CVE) ID: CVE-2007-5268
BugTraq ID: 25956
http://www.securityfocus.com/bid/25956
http://sourceforge.net/mailarchive/message.php?msg_name=5122753600C3E94F87FBDFFCC090D1FF0400EBC5%40MERCMBX07.na.sas.com
http://sourceforge.net/mailarchive/forum.php?thread_name=3.0.6.32.20071004082318.012a7628%40mail.comcast.net&forum_name=png-mng-implement
http://secunia.com/advisories/27093
http://secunia.com/advisories/27405
http://www.ubuntu.com/usn/usn-538-1
http://www.vupen.com/english/advisories/2007/3390
Common Vulnerability Exposure (CVE) ID: CVE-2007-5269
BugTraq ID: 28276
http://www.securityfocus.com/bid/28276
Bugtraq: 20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues (Google Search)
http://www.securityfocus.com/archive/1/489739/100/0/threaded
Bugtraq: 20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues. (Google Search)
http://www.securityfocus.com/archive/1/495869/100/0/threaded
Debian Security Information: DSA-1750 (Google Search)
http://www.debian.org/security/2009/dsa-1750
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00353.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00356.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00072.html
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://lists.vmware.com/pipermail/security-announce/2008/000008.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10614
http://www.redhat.com/support/errata/RHSA-2007-0992.html
http://www.securitytracker.com/id?1018849
http://secunia.com/advisories/27369
http://secunia.com/advisories/27391
http://secunia.com/advisories/27492
http://secunia.com/advisories/27662
http://secunia.com/advisories/27965
http://secunia.com/advisories/31712
http://secunia.com/advisories/31713
http://secunia.com/advisories/34388
SuSE Security Announcement: SUSE-SR:2007:025 (Google Search)
http://www.novell.com/linux/security/advisories/2007_25_sr.html
http://www.vupen.com/english/advisories/2008/0905/references
http://www.vupen.com/english/advisories/2008/2466
Common Vulnerability Exposure (CVE) ID: CVE-2008-1574
BugTraq ID: 29514
http://www.securityfocus.com/bid/29514
XForce ISS Database: macosx-imageio-jpeg2000-bo(42722)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42722
Common Vulnerability Exposure (CVE) ID: CVE-2008-0177
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
BugTraq ID: 27642
http://www.securityfocus.com/bid/27642
CERT/CC vulnerability note: VU#110947
http://www.kb.cert.org/vuls/id/110947
https://www.exploit-db.com/exploits/5191
FreeBSD Security Advisory: FreeBSD-SA-08:04
http://security.freebsd.org/advisories/FreeBSD-SA-08:04.ipsec.asc
http://securitytracker.com/id?1019314
http://secunia.com/advisories/28788
http://secunia.com/advisories/28816
http://secunia.com/advisories/28979
http://secunia.com/advisories/29130
http://secunia.com/advisories/31074
http://www.vupen.com/english/advisories/2008/0441
http://www.vupen.com/english/advisories/2008/0688
http://www.vupen.com/english/advisories/2008/2094/references
Common Vulnerability Exposure (CVE) ID: CVE-2007-6359
BugTraq ID: 26840
http://www.securityfocus.com/bid/26840
http://digit-labs.org/files/exploits/xnu-superblob-dos.c
http://secunia.com/advisories/28048
http://www.vupen.com/english/advisories/2007/4216
XForce ISS Database: macosx-csvalidatepage-dos(38997)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38997
Common Vulnerability Exposure (CVE) ID: CVE-2008-1576
BugTraq ID: 29500
http://www.securityfocus.com/bid/29500
http://securitytracker.com/id?1020140
XForce ISS Database: macosx-mail-code-execution(42723)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42723
Common Vulnerability Exposure (CVE) ID: CVE-2007-6612
BugTraq ID: 27133
http://www.securityfocus.com/bid/27133
http://rubyforge.org/pipermail/mongrel-users/2007-December/004733.html
http://rubyforge.org/pipermail/mongrel-users/2007-December/004736.html
http://rubyforge.org/pipermail/mongrel-users/2007-December/004742.html
http://rubyforge.org/pipermail/mongrel-users/2007-December/004743.html
http://osvdb.org/39866
http://secunia.com/advisories/28323
Common Vulnerability Exposure (CVE) ID: CVE-2008-1578
BugTraq ID: 29520
http://www.securityfocus.com/bid/29520
http://securitytracker.com/id?1020142
XForce ISS Database: macosx-ssoutil-information-disclosure(42725)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42725
Common Vulnerability Exposure (CVE) ID: CVE-2008-1579
http://securitytracker.com/id?1020143
XForce ISS Database: macosx-wikiserver-information-disclosure(42727)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42727
CopyrightCopyright (C) 2010 LSS

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.