English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 75096 Descripciones CVE y
39644 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.102035
Categoría:Mac OS X Local Security Checks
Título:Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002
Resumen:Checks for existence of Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002
Descripción:
Overview:
The remote host is missing Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002.
One or more of the following components are affected:

Apache
ATS
BIND
CFNetwork
CoreGraphics
Cscope
CUPS
Disk Images
enscript
Flash Player plug-in
Help Viewer
iChat
International Components for Unicode
IPSec
Kerberos
Kernel
Launch Services
libxml
Net-SNMP
Network Time
Networking
OpenSSL
PHP
QuickDraw Manager
ruby
Safari
Spotlight
system_cmds
telnet
Terminal
WebKit
X11

Solution:
Update your Mac OS X operating system.

For more information see:
http://support.apple.com/kb/HT3549
Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-2939
Bugtraq: 20080806 Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495180/100/0/threaded
Bugtraq: 20081122 rPSA-2008-0327-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498566/100/0/threaded
Bugtraq: 20081122 rPSA-2008-0328-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498567/100/0/threaded
http://www.rapid7.com/advisories/R7-0033
AIX APAR: PK70197
http://www-1.ibm.com/support/docview.wss?uid=swg1PK70197
AIX APAR: PK70937
http://www-1.ibm.com/support/docview.wss?uid=swg1PK70937
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
HPdes Security Advisory: HPSBUX02401
http://marc.info/?l=bugtraq&m=123376588623823&w=2
HPdes Security Advisory: SSRT090005
HPdes Security Advisory: HPSBUX02465
http://marc.info/?l=bugtraq&m=125631037611762&w=2
HPdes Security Advisory: SSRT090192
http://www.mandriva.com/security/advisories?name=MDVSA-2008:194
http://www.mandriva.com/security/advisories?name=MDVSA-2008:195
http://www.mandriva.com/security/advisories?name=MDVSA-2009:124
RedHat Security Advisories: RHSA-2008:0967
http://rhn.redhat.com/errata/RHSA-2008-0967.html
http://www.redhat.com/support/errata/RHSA-2008-0966.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1
SuSE Security Announcement: SUSE-SR:2008:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html
http://www.ubuntu.com/usn/USN-731-1
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
CERT/CC vulnerability note: VU#663763
http://www.kb.cert.org/vuls/id/663763
BugTraq ID: 30560
http://www.securityfocus.com/bid/30560
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11316
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7716
http://secunia.com/advisories/34219
http://secunia.com/advisories/35074
http://www.vupen.com/english/advisories/2008/2315
http://www.vupen.com/english/advisories/2008/2461
http://www.vupen.com/english/advisories/2009/0320
http://www.securitytracker.com/id?1020635
http://secunia.com/advisories/31384
http://secunia.com/advisories/31673
http://secunia.com/advisories/32685
http://secunia.com/advisories/33156
http://secunia.com/advisories/33797
http://secunia.com/advisories/32838
http://www.vupen.com/english/advisories/2009/1297
XForce ISS Database: apache-modproxyftp-xss(44223)
http://xforce.iss.net/xforce/xfdb/44223
Common Vulnerability Exposure (CVE) ID: CVE-2008-0456
Bugtraq: 20080122 Apache mod_negotiation Xss and Http Response Splitting (Google Search)
http://www.securityfocus.com/archive/1/archive/1/486847/100/0/threaded
http://www.mindedsecurity.com/MSA01150108.html
http://security.gentoo.org/glsa/glsa-200803-19.xml
RedHat Security Advisories: RHSA-2013:0130
http://rhn.redhat.com/errata/RHSA-2013-0130.html
BugTraq ID: 27409
http://www.securityfocus.com/bid/27409
http://securitytracker.com/id?1019256
http://secunia.com/advisories/29348
http://securityreason.com/securityalert/3575
XForce ISS Database: apache-modnegotiation-response-splitting(39893)
http://xforce.iss.net/xforce/xfdb/39893
Common Vulnerability Exposure (CVE) ID: CVE-2009-0154
Bugtraq: 20090519 ZDI-09-023: Apple OS X ATSServer Compact Font Format Parsing Memory Corruption Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503597/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-09-023
BugTraq ID: 34926
http://www.securityfocus.com/bid/34926
http://www.securitytracker.com/id?1022218
XForce ISS Database: macos-ats-cff-bo(50478)
http://xforce.iss.net/xforce/xfdb/50478
Common Vulnerability Exposure (CVE) ID: CVE-2009-0025
Bugtraq: 20090120 rPSA-2009-0009-1 bind bind-utils (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500207/100/0/threaded
Bugtraq: 20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502322/100/0/threaded
Bugtraq: 20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499827/100/0/threaded
http://www.ocert.org/advisories/ocert-2008-016.html
http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00393.html
FreeBSD Security Advisory: FreeBSD-SA-08:09
http://security.freebsd.org/advisories/FreeBSD-SA-09:04.bind.asc
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362
http://sunsolve.sun.com/search/document.do?assetkey=1-26-250846-1
BugTraq ID: 33151
http://www.securityfocus.com/bid/33151
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10879
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5569
http://www.vupen.com/english/advisories/2009/0043
http://www.vupen.com/english/advisories/2009/0366
http://secunia.com/advisories/33559
http://secunia.com/advisories/33683
http://secunia.com/advisories/33494
http://secunia.com/advisories/33546
http://secunia.com/advisories/33551
http://secunia.com/advisories/33882
http://www.vupen.com/english/advisories/2009/0904
Common Vulnerability Exposure (CVE) ID: CVE-2009-0144
http://www.securitytracker.com/id?1022214
XForce ISS Database: macos-cfnetwork-info-disclosure(50479)
http://xforce.iss.net/xforce/xfdb/50479
Common Vulnerability Exposure (CVE) ID: CVE-2009-0157
http://www.securitytracker.com/id?1022211
XForce ISS Database: macos-cfnetwork-bo(50480)
http://xforce.iss.net/xforce/xfdb/50480
Common Vulnerability Exposure (CVE) ID: CVE-2009-0145
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://www.securitytracker.com/id?1022209
http://secunia.com/advisories/35379
http://www.vupen.com/english/advisories/2009/1522
http://www.vupen.com/english/advisories/2009/1621
XForce ISS Database: macos-coregraphics-pdf-code-execution(50481)
http://xforce.iss.net/xforce/xfdb/50481
Common Vulnerability Exposure (CVE) ID: CVE-2009-0155
XForce ISS Database: macos-coregraphics-pdf-bo(50482)
http://xforce.iss.net/xforce/xfdb/50482
Common Vulnerability Exposure (CVE) ID: CVE-2009-0146
Bugtraq: 20090417 rPSA-2009-0059-1 poppler (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502761/100/0/threaded
Bugtraq: 20090417 rPSA-2009-0061-1 cups (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502750/100/0/threaded
Debian Security Information: DSA-1790 (Google Search)
http://www.debian.org/security/2009/dsa-1790
Debian Security Information: DSA-1793 (Google Search)
http://www.debian.org/security/2009/dsa-1793
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html
http://security.gentoo.org/glsa/glsa-200904-20.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:101
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
http://www.redhat.com/support/errata/RHSA-2009-0430.html
http://www.redhat.com/support/errata/RHSA-2009-0429.html
http://www.redhat.com/support/errata/RHSA-2009-0431.html
RedHat Security Advisories: RHSA-2009:0458
http://rhn.redhat.com/errata/RHSA-2009-0458.html
http://www.redhat.com/support/errata/RHSA-2009-0480.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477
SuSE Security Announcement: SUSE-SA:2009:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html
SuSE Security Announcement: SUSE-SR:2009:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
SuSE Security Announcement: SUSE-SR:2009:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
BugTraq ID: 34568
http://www.securityfocus.com/bid/34568
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9632
http://www.securitytracker.com/id?1022073
http://secunia.com/advisories/34755
http://secunia.com/advisories/34291
http://secunia.com/advisories/34481
http://secunia.com/advisories/34852
http://secunia.com/advisories/34756
http://secunia.com/advisories/34959
http://secunia.com/advisories/34963
http://secunia.com/advisories/35037
http://secunia.com/advisories/35065
http://secunia.com/advisories/34991
http://secunia.com/advisories/35064
http://secunia.com/advisories/35618
http://secunia.com/advisories/35685
http://www.vupen.com/english/advisories/2009/1065
http://www.vupen.com/english/advisories/2009/1066
http://www.vupen.com/english/advisories/2009/1077
http://www.vupen.com/english/advisories/2010/1040
Common Vulnerability Exposure (CVE) ID: CVE-2009-0147
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9941
Common Vulnerability Exposure (CVE) ID: CVE-2009-0165
XForce ISS Database: multiple-jbig2-unspecified(50377)
http://xforce.iss.net/xforce/xfdb/50377
Common Vulnerability Exposure (CVE) ID: CVE-2009-0148
http://sourceforge.net/mailarchive/forum.php?thread_name=E1LsGx3-00015K-TN%40ddv4jf1.ch3.sourceforge.com&forum_name=cscope-cvs
http://www.openwall.com/lists/oss-security/2009/05/06/9
Debian Security Information: DSA-1806 (Google Search)
http://www.debian.org/security/2009/dsa-1806
http://security.gentoo.org/glsa/glsa-200905-02.xml
http://www.redhat.com/support/errata/RHSA-2009-1101.html
http://www.redhat.com/support/errata/RHSA-2009-1102.html
BugTraq ID: 34805
http://www.securityfocus.com/bid/34805
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9633
http://secunia.com/advisories/34978
http://secunia.com/advisories/35213
http://secunia.com/advisories/35214
http://secunia.com/advisories/35462
http://www.vupen.com/english/advisories/2009/1238
Common Vulnerability Exposure (CVE) ID: CVE-2009-0164
BugTraq ID: 34665
http://www.securityfocus.com/bid/34665
Common Vulnerability Exposure (CVE) ID: CVE-2009-0150
http://www.securitytracker.com/id?1022217
XForce ISS Database: macos-diskimages-bo(50483)
http://xforce.iss.net/xforce/xfdb/50483
Common Vulnerability Exposure (CVE) ID: CVE-2009-0149
BugTraq ID: 34942
http://www.securityfocus.com/bid/34942
XForce ISS Database: macos-diskimages-code-execution-var1(50484)
http://xforce.iss.net/xforce/xfdb/50484
Common Vulnerability Exposure (CVE) ID: CVE-2004-1184
Bugtraq: 20060526 rPSA-2006-0083-1 enscript (Google Search)
http://www.securityfocus.com/archive/1/archive/1/435199/100/0/threaded
Debian Security Information: DSA-654 (Google Search)
http://www.debian.org/security/2005/dsa-654
http://www.securityfocus.com/archive/1/archive/1/419768/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:033
http://www.redhat.com/support/errata/RHSA-2005-040.html
http://www.ubuntulinux.org/support/documentation/usn/usn-68-1
BugTraq ID: 12329
http://www.securityfocus.com/bid/12329
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9658
http://securitytracker.com/id?1012965
XForce ISS Database: enscript-epsf-command-ececution(19012)
http://xforce.iss.net/xforce/xfdb/19012
Common Vulnerability Exposure (CVE) ID: CVE-2004-1185
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10808
XForce ISS Database: enscript-filename-command-execution(19029)
http://xforce.iss.net/xforce/xfdb/19029
Common Vulnerability Exposure (CVE) ID: CVE-2004-1186
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11134
XForce ISS Database: enscript-multiple-bo(19033)
http://xforce.iss.net/xforce/xfdb/19033
Common Vulnerability Exposure (CVE) ID: CVE-2008-3863
Bugtraq: 20081022 Secunia Research: GNU Enscript "setfilename" Special Escape Buffer Overflow (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497647/100/0/threaded
Bugtraq: 20081117 rPSA-2008-0321-1 enscript (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498385/100/0/threaded
http://secunia.com/secunia_research/2008-41/
Debian Security Information: DSA-1670 (Google Search)
http://www.debian.org/security/2008/dsa-1670
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00014.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00040.html
http://security.gentoo.org/glsa/glsa-200812-02.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:243
http://www.redhat.com/support/errata/RHSA-2008-1016.html
RedHat Security Advisories: RHSA-2008:1021
http://rhn.redhat.com/errata/RHSA-2008-1021.html
http://www.ubuntu.com/usn/usn-660-1
BugTraq ID: 31858
http://www.securityfocus.com/bid/31858
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9939
http://secunia.com/advisories/32753
http://secunia.com/advisories/32854
http://www.vupen.com/english/advisories/2008/2891
http://secunia.com/advisories/32137
http://secunia.com/advisories/32530
http://secunia.com/advisories/33109
http://secunia.com/advisories/32970
http://secunia.com/advisories/32521
http://securityreason.com/securityalert/4488
XForce ISS Database: gnuenscript-readspecialescape-bo(46026)
http://xforce.iss.net/xforce/xfdb/46026
Common Vulnerability Exposure (CVE) ID: CVE-2009-0519
http://isc.sans.org/diary.html?storyid=5929
http://security.gentoo.org/glsa/glsa-200903-23.xml
RedHat Security Advisories: RHSA-2009:0332
http://rhn.redhat.com/errata/RHSA-2009-0332.html
RedHat Security Advisories: RHSA-2009:0334
http://rhn.redhat.com/errata/RHSA-2009-0334.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-254909-1
BugTraq ID: 33890
http://www.securityfocus.com/bid/33890
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6470
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15837
http://secunia.com/advisories/34012
http://secunia.com/advisories/34293
http://secunia.com/advisories/34226
http://www.vupen.com/english/advisories/2009/0513
http://www.vupen.com/english/advisories/2009/0743
XForce ISS Database: flash-swf-unspecified-dos(48900)
http://xforce.iss.net/xforce/xfdb/48900
Common Vulnerability Exposure (CVE) ID: CVE-2009-0520
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=773
BugTraq ID: 33880
http://www.securityfocus.com/bid/33880
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6593
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:16057
http://securitytracker.com/id?1021750
XForce ISS Database: flash-invalid-object-bo(48887)
http://xforce.iss.net/xforce/xfdb/48887
Common Vulnerability Exposure (CVE) ID: CVE-2009-0114
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6662
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:16419
http://securitytracker.com/id?1021751
XForce ISS Database: flash-settings-manager-click-hijacking(48902)
http://xforce.iss.net/xforce/xfdb/48902
Common Vulnerability Exposure (CVE) ID: CVE-2009-0942
http://www.securitytracker.com/id?1022216
XForce ISS Database: macos-helpviewer-css-code-execution(50485)
http://xforce.iss.net/xforce/xfdb/50485
Common Vulnerability Exposure (CVE) ID: CVE-2009-0943
XForce ISS Database: macos-helpviewer-html-code-execution(50486)
http://xforce.iss.net/xforce/xfdb/50486
Common Vulnerability Exposure (CVE) ID: CVE-2009-0152
http://www.securitytracker.com/id?1022212
XForce ISS Database: macos-ichat-ssl-weak-security(50487)
http://xforce.iss.net/xforce/xfdb/50487
Common Vulnerability Exposure (CVE) ID: CVE-2009-0153
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html
http://www.redhat.com/support/errata/RHSA-2009-1122.html
BugTraq ID: 34974
http://www.securityfocus.com/bid/34974
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11366
http://secunia.com/advisories/35436
http://secunia.com/advisories/35498
http://secunia.com/advisories/35584
XForce ISS Database: macos-icu-security-bypass(50488)
http://xforce.iss.net/xforce/xfdb/50488
Common Vulnerability Exposure (CVE) ID: CVE-2008-3651
http://marc.info/?l=ipsec-tools-devel&m=121688914101709&w=2
http://sourceforge.net/mailarchive/message.php?msg_name=20080724084529.GA3768%40zen.inc
http://security.gentoo.org/glsa/glsa-200812-03.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:181
http://www.redhat.com/support/errata/RHSA-2008-0849.html
SuSE Security Announcement: SUSE-SR:2008:025 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
SuSE Security Announcement: SUSE-SR:2009:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
http://www.ubuntu.com/usn/usn-641-1
BugTraq ID: 30657
http://www.securityfocus.com/bid/30657
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10453
http://www.vupen.com/english/advisories/2008/2345
http://www.vupen.com/english/advisories/2008/2844
http://www.securitytracker.com/id?1020667
http://secunia.com/advisories/31450
http://secunia.com/advisories/31624
http://secunia.com/advisories/32759
http://secunia.com/advisories/32971
XForce ISS Database: ipsectools-racoon-dos(44395)
http://xforce.iss.net/xforce/xfdb/44395
Common Vulnerability Exposure (CVE) ID: CVE-2008-3652
http://sourceforge.net/mailarchive/forum.php?thread_name=48a0c7a0.qPeWZAE0PY8bDDq%2B%25olel%40ans.pl&forum_name=ipsec-tools-devel
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10448
http://www.vupen.com/english/advisories/2008/2378
http://www.securitytracker.com/id?1020692
http://secunia.com/advisories/31478
XForce ISS Database: ipsectools-orphanedph1-dos(44424)
http://xforce.iss.net/xforce/xfdb/44424
Common Vulnerability Exposure (CVE) ID: CVE-2009-0845
Bugtraq: 20090407 MITKRB5-SA-2009-001: multiple vulnerabilities in SPNEGO, ASN.1 decoder [CVE-2009-0844 CVE-2009-0845 CVE-2009-0847] (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502526/100/0/threaded
Bugtraq: 20090407 rPSA-2009-0058-1 krb5 krb5-server krb5-services krb5-test krb5-workstation (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502546/100/0/threaded
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html
http://security.gentoo.org/glsa/glsa-200904-09.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:082
http://www.redhat.com/support/errata/RHSA-2009-0408.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1
http://www.ubuntu.com/usn/usn-755-1
CERT/CC vulnerability note: VU#662091
http://www.kb.cert.org/vuls/id/662091
BugTraq ID: 34257
http://www.securityfocus.com/bid/34257
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10044
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6449
http://www.securitytracker.com/id?1021867
http://secunia.com/advisories/34347
http://secunia.com/advisories/34640
http://secunia.com/advisories/34594
http://secunia.com/advisories/34617
http://secunia.com/advisories/34622
http://secunia.com/advisories/34630
http://secunia.com/advisories/34637
http://secunia.com/advisories/34628
http://secunia.com/advisories/34734
http://www.vupen.com/english/advisories/2009/0847
http://www.vupen.com/english/advisories/2009/0976
http://www.vupen.com/english/advisories/2009/1106
http://www.vupen.com/english/advisories/2009/1057
http://www.vupen.com/english/advisories/2009/2248
XForce ISS Database: kerberos-spnego-dos(49448)
http://xforce.iss.net/xforce/xfdb/49448
Common Vulnerability Exposure (CVE) ID: CVE-2009-0846
Bugtraq: 20090407 MITKRB5-SA-2009-002: ASN.1 decoder frees uninitialized pointer [CVE-2009-0846] (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502527/100/0/threaded
Bugtraq: 20090701 VMSA-2009-0008 ESX Service Console update for krb5 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504683/100/0/threaded
http://lists.vmware.com/pipermail/security-announce/2009/000059.html
HPdes Security Advisory: HPSBUX02421
http://marc.info/?l=bugtraq&m=124896429301168&w=2
HPdes Security Advisory: SSRT090047
HPdes Security Advisory: HPSBOV02682
http://marc.info/?l=bugtraq&m=130497213107107&w=2
HPdes Security Advisory: SSRT100495
http://www.mandriva.com/security/advisories?name=MDVSA-2009:098
RedHat Security Advisories: RHSA-2009:0409
http://rhn.redhat.com/errata/RHSA-2009-0409.html
RedHat Security Advisories: RHSA-2009:0410
http://rhn.redhat.com/errata/RHSA-2009-0410.html
BugTraq ID: 34409
http://www.securityfocus.com/bid/34409
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10694
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5483
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6301
http://www.securitytracker.com/id?1021994
http://secunia.com/advisories/34598
http://secunia.com/advisories/35667
http://www.vupen.com/english/advisories/2009/0960
http://www.vupen.com/english/advisories/2009/2084
Common Vulnerability Exposure (CVE) ID: CVE-2009-0847
BugTraq ID: 34408
http://www.securityfocus.com/bid/34408
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6387
http://www.securitytracker.com/id?1021993
Common Vulnerability Exposure (CVE) ID: CVE-2009-0844
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6339
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9474
Common Vulnerability Exposure (CVE) ID: CVE-2008-1517
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=797
http://www.securitytracker.com/id?1022213
XForce ISS Database: macos-kernel-workqueue-code-execution(50489)
http://xforce.iss.net/xforce/xfdb/50489
Common Vulnerability Exposure (CVE) ID: CVE-2009-0156
BugTraq ID: 34932
http://www.securityfocus.com/bid/34932
http://www.securitytracker.com/id?1022215
XForce ISS Database: macos-launchservices-dos(50490)
http://xforce.iss.net/xforce/xfdb/50490
Common Vulnerability Exposure (CVE) ID: CVE-2008-3529
http://www.milw0rm.com/exploits/8798
http://xmlsoft.org/news.html
http://lists.apple.com/archives/security-announce/2009/May/msg00000.html
Debian Security Information: DSA-1654 (Google Search)
http://www.debian.org/security/2008/dsa-1654
http://security.gentoo.org/glsa/glsa-200812-06.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:192
http://www.redhat.com/support/errata/RHSA-2008-0884.html
http://www.redhat.com/support/errata/RHSA-2008-0886.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-247346-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
SuSE Security Announcement: SUSE-SR:2008:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
http://www.ubuntulinux.org/support/documentation/usn/usn-644-1
http://www.ubuntu.com/usn/USN-815-1
BugTraq ID: 31126
http://www.securityfocus.com/bid/31126
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11760
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6103
http://secunia.com/advisories/31558
http://secunia.com/advisories/35056
http://secunia.com/advisories/36173
http://secunia.com/advisories/36235
http://www.vupen.com/english/advisories/2008/2822
http://securitytracker.com/id?1020855
http://secunia.com/advisories/31855
http://secunia.com/advisories/31860
http://secunia.com/advisories/31868
http://secunia.com/advisories/32280
http://secunia.com/advisories/32807
http://secunia.com/advisories/32974
http://secunia.com/advisories/33715
http://secunia.com/advisories/31982
http://secunia.com/advisories/33722
http://secunia.com/advisories/32265
http://www.vupen.com/english/advisories/2009/1298
XForce ISS Database: libxml2-entitynames-bo(45085)
http://xforce.iss.net/xforce/xfdb/45085
Common Vulnerability Exposure (CVE) ID: CVE-2008-4309
Bugtraq: 20081112 rPSA-2008-0315-1 net-snmp net-snmp-client net-snmp-server net-snmp-utils (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498280/100/0/threaded
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271&r2=17272&pathrev=17272
http://www.openwall.com/lists/oss-security/2008/10/31/1
http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html
Debian Security Information: DSA-1663 (Google Search)
http://www.debian.org/security/2008/dsa-1663
http://security.gentoo.org/glsa/glsa-200901-15.xml
HPdes Security Advisory: HPSBMA02447
http://marc.info/?l=bugtraq&m=125017764422557&w=2
HPdes Security Advisory: SSRT090062
http://www.mandriva.com/security/advisories?name=MDVSA-2008:225
http://www.redhat.com/support/errata/RHSA-2008-0971.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1
SuSE Security Announcement: SUSE-SR:2009:003 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
http://www.ubuntu.com/usn/usn-685-1
BugTraq ID: 32020
http://www.securityfocus.com/bid/32020
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6171
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6353
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9860
http://www.securitytracker.com/id?1021129
http://secunia.com/advisories/32539
http://secunia.com/advisories/33095
http://secunia.com/advisories/33003
http://secunia.com/advisories/33746
http://secunia.com/advisories/35679
http://www.vupen.com/english/advisories/2009/0301
http://www.vupen.com/english/advisories/2008/3400
http://www.vupen.com/english/advisories/2008/2973
http://secunia.com/advisories/32711
http://secunia.com/advisories/32664
http://secunia.com/advisories/33631
http://secunia.com/advisories/32560
http://secunia.com/advisories/33821
http://www.vupen.com/english/advisories/2009/1771
XForce ISS Database: netsnmp-netsnmpcreatesubtreecache-dos(46262)
http://xforce.iss.net/xforce/xfdb/46262
Common Vulnerability Exposure (CVE) ID: CVE-2009-0021
https://lists.ntp.org/pipermail/announce/2009-January/000055.html
http://www.redhat.com/support/errata/RHSA-2009-0046.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.531177
SuSE Security Announcement: SUSE-SR:2009:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
SuSE Security Announcement: SUSE-SR:2009:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10035
http://secunia.com/advisories/34642
http://www.vupen.com/english/advisories/2009/0042
http://www.securitytracker.com/id?1021533
http://secunia.com/advisories/33406
http://secunia.com/advisories/33558
http://secunia.com/advisories/33648
Common Vulnerability Exposure (CVE) ID: CVE-2009-0159
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
Debian Security Information: DSA-1801 (Google Search)
http://www.debian.org/security/2009/dsa-1801
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01414.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01449.html
http://www.gentoo.org/security/en/glsa/glsa-200905-08.xml
HPdes Security Advisory: HPSBUX02859
http://marc.info/?l=bugtraq&m=136482797910018&w=2
HPdes Security Advisory: SSRT101144
http://www.mandriva.com/security/advisories?name=MDVSA-2009:092
NETBSD Security Advisory: NetBSD-SA2009-006
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-006.txt.asc
RedHat Security Advisories: RHSA-2009:1039
http://rhn.redhat.com/errata/RHSA-2009-1039.html
RedHat Security Advisories: RHSA-2009:1040
http://rhn.redhat.com/errata/RHSA-2009-1040.html
RedHat Security Advisories: RHSA-2009:1651
https://rhn.redhat.com/errata/RHSA-2009-1651.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.566238
SuSE Security Announcement: SUSE-SR:2009:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://www.ubuntulinux.org/support/documentation/usn/usn-777-1
BugTraq ID: 34481
http://www.securityfocus.com/bid/34481
http://osvdb.org/53593
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5411
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8386
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8665
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9634
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19392
http://www.securitytracker.com/id?1022033
http://secunia.com/advisories/34608
http://secunia.com/advisories/35137
http://secunia.com/advisories/35166
http://secunia.com/advisories/35169
http://secunia.com/advisories/35253
http://secunia.com/advisories/35138
http://secunia.com/advisories/35308
http://secunia.com/advisories/35336
http://secunia.com/advisories/35416
http://secunia.com/advisories/35630
http://secunia.com/advisories/37471
http://www.vupen.com/english/advisories/2009/0999
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: ntp-cookedprint-bo(49838)
http://xforce.iss.net/xforce/xfdb/49838
Common Vulnerability Exposure (CVE) ID: CVE-2008-3530
http://security.freebsd.org/advisories/FreeBSD-SA-08:09.icmp6.asc
NETBSD Security Advisory: NetBSD-SA2008-015
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-015.txt.asc
BugTraq ID: 31004
http://www.securityfocus.com/bid/31004
http://www.securitytracker.com/id?1020820
http://www.securitytracker.com/id?1021111
http://secunia.com/advisories/31745
http://secunia.com/advisories/32401
http://www.vupen.com/english/advisories/2009/0633
XForce ISS Database: freebsd-icmp6mtudiscupdate-dos(44908)
http://xforce.iss.net/xforce/xfdb/44908
Common Vulnerability Exposure (CVE) ID: CVE-2008-5077
http://security.gentoo.org/glsa/glsa-200902-02.xml
HPdes Security Advisory: HPSBUX02418
http://marc.info/?l=bugtraq&m=123859864430555&w=2
HPdes Security Advisory: SSRT090002
HPdes Security Advisory: HPSBMA02426
http://marc.info/?l=bugtraq&m=124277349419254&w=2
HPdes Security Advisory: SSRT090053
http://www.redhat.com/support/errata/RHSA-2009-0004.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.544796
http://sunsolve.sun.com/search/document.do?assetkey=1-66-250826-1
SuSE Security Announcement: SUSE-SU-2011:0847 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
SuSE Security Announcement: openSUSE-SU-2011:0845 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
http://www.ubuntulinux.org/support/documentation/usn/usn-704-1
BugTraq ID: 33150
http://www.securityfocus.com/bid/33150
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6380
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9155
http://www.securitytracker.com/id?1021523
http://secunia.com/advisories/34211
http://secunia.com/advisories/35108
http://secunia.com/advisories/39005
http://secunia.com/advisories/33338
http://secunia.com/advisories/33394
http://www.vupen.com/english/advisories/2009/0040
http://www.vupen.com/english/advisories/2009/0289
http://www.vupen.com/english/advisories/2009/0362
http://secunia.com/advisories/33765
http://secunia.com/advisories/33673
http://secunia.com/advisories/33557
http://secunia.com/advisories/33436
http://www.vupen.com/english/advisories/2009/0558
http://www.vupen.com/english/advisories/2009/0913
http://www.vupen.com/english/advisories/2009/1338
Common Vulnerability Exposure (CVE) ID: CVE-2008-3659
Bugtraq: 20090302 rPSA-2009-0035-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/501376/100/0/threaded
http://www.openwall.com/lists/oss-security/2008/08/08/2
http://www.openwall.com/lists/oss-security/2008/08/08/3
http://www.openwall.com/lists/oss-security/2008/08/08/4
http://www.openwall.com/lists/oss-security/2008/08/13/8
Debian Security Information: DSA-1647 (Google Search)
http://www.debian.org/security/2008/dsa-1647
http://security.gentoo.org/glsa/glsa-200811-05.xml
HPdes Security Advisory: HPSBUX02431
http://marc.info/?l=bugtraq&m=124654546101607&w=2
HPdes Security Advisory: SSRT090085
http://www.mandriva.com/security/advisories?name=MDVSA-2009:021
http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
http://www.mandriva.com/security/advisories?name=MDVSA-2009:024
SuSE Security Announcement: SUSE-SR:2008:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
http://osvdb.org/47483
http://www.securitytracker.com/id?1020995
http://secunia.com/advisories/32148
http://secunia.com/advisories/32316
http://secunia.com/advisories/35650
http://secunia.com/advisories/32746
http://www.vupen.com/english/advisories/2008/2336
XForce ISS Database: php-memnstr-bo(44405)
http://xforce.iss.net/xforce/xfdb/44405
Common Vulnerability Exposure (CVE) ID: CVE-2008-2829
http://bugs.php.net/bug.php?id=42862
http://www.openwall.com/lists/oss-security/2008/06/19/6
http://www.openwall.com/lists/oss-security/2008/06/24/2
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:126
http://www.mandriva.com/security/advisories?name=MDVSA-2008:127
http://www.mandriva.com/security/advisories?name=MDVSA-2008:128
SuSE Security Announcement: SUSE-SR:2008:027 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
http://www.ubuntu.com/usn/usn-628-1
BugTraq ID: 29829
http://www.securityfocus.com/bid/29829
http://osvdb.org/46641
http://secunia.com/advisories/31200
http://secunia.com/advisories/35306
XForce ISS Database: php-phpimap-dos(43357)
http://xforce.iss.net/xforce/xfdb/43357
Common Vulnerability Exposure (CVE) ID: CVE-2008-3660
http://www.redhat.com/support/errata/RHSA-2009-0350.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9597
http://www.securitytracker.com/id?1020994
XForce ISS Database: php-curl-unspecified(44402)
http://xforce.iss.net/xforce/xfdb/44402
Common Vulnerability Exposure (CVE) ID: CVE-2008-2666
http://securityreason.com/achievement_securityalert/55
BugTraq ID: 29796
http://www.securityfocus.com/bid/29796
http://www.securitytracker.com/id?1020328
http://securityreason.com/securityalert/3942
XForce ISS Database: php-chdir-ftoc-security-bypass(43198)
http://xforce.iss.net/xforce/xfdb/43198
Common Vulnerability Exposure (CVE) ID: CVE-2008-2371
Bugtraq: 20081027 rPSA-2008-0305-1 pcre (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497828/100/0/threaded
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
Debian Security Information: DSA-1602 (Google Search)
http://www.debian.org/security/2008/dsa-1602
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html
http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:147
SuSE Security Announcement: SUSE-SR:2008:014 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
http://www.ubuntu.com/usn/usn-624-1
http://ubuntu.com/usn/usn-624-2
BugTraq ID: 30087
http://www.securityfocus.com/bid/30087
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
http://secunia.com/advisories/39300
http://www.vupen.com/english/advisories/2008/2005
http://www.vupen.com/english/advisories/2008/2006
http://www.vupen.com/english/advisories/2008/2780
http://secunia.com/advisories/30916
http://secunia.com/advisories/30944
http://secunia.com/advisories/30958
http://secunia.com/advisories/30961
http://secunia.com/advisories/30945
http://secunia.com/advisories/30972
http://secunia.com/advisories/30967
http://secunia.com/advisories/30990
http://secunia.com/advisories/32222
http://secunia.com/advisories/32454
http://www.vupen.com/english/advisories/2010/0833
Common Vulnerability Exposure (CVE) ID: CVE-2008-2665
http://securityreason.com/achievement_securityalert/54
BugTraq ID: 29797
http://www.securityfocus.com/bid/29797
http://www.securitytracker.com/id?1020327
http://securityreason.com/securityalert/3941
XForce ISS Database: php-posixaccess-security-bypass(43196)
http://xforce.iss.net/xforce/xfdb/43196
Common Vulnerability Exposure (CVE) ID: CVE-2008-3658
http://news.php.net/php.cvs/51219
HPdes Security Advisory: HPSBTU02382
http://www.securityfocus.com/archive/1/archive/1/498647/100/0/threaded
HPdes Security Advisory: SSRT080132
BugTraq ID: 30649
http://www.securityfocus.com/bid/30649
http://osvdb.org/47484
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9724
http://www.vupen.com/english/advisories/2008/3275
http://secunia.com/advisories/32884
XForce ISS Database: php-imageloadfont-dos(44401)
http://xforce.iss.net/xforce/xfdb/44401
Common Vulnerability Exposure (CVE) ID: CVE-2008-5557
http://archives.neohapsis.com/archives/fulldisclosure/2008-12/0477.html
Debian Security Information: DSA-1789 (Google Search)
http://www.debian.org/security/2009/dsa-1789
HPdes Security Advisory: HPSBMA02492
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444
HPdes Security Advisory: SSRT100079
http://www.mandriva.com/security/advisories?name=MDVSA-2009:045
BugTraq ID: 32948
http://www.securityfocus.com/bid/32948
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10286
http://securitytracker.com/id?1021482
http://secunia.com/advisories/35003
XForce ISS Database: php-multibyte-bo(47525)
http://xforce.iss.net/xforce/xfdb/47525
Common Vulnerability Exposure (CVE) ID: CVE-2008-3443
http://www.milw0rm.com/exploits/6239
Debian Security Information: DSA-1695 (Google Search)
http://www.debian.org/security/2009/dsa-1695
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html
http://www.redhat.com/support/errata/RHSA-2008-0895.html
http://www.redhat.com/support/errata/RHSA-2008-0897.html
http://www.ubuntulinux.org/support/documentation/usn/usn-691-1
http://www.ubuntulinux.org/support/documentation/usn/usn-651-1
BugTraq ID: 30682
http://www.securityfocus.com/bid/30682
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9570
http://www.securitytracker.com/id?1021075
http://secunia.com/advisories/33185
http://secunia.com/advisories/31430
http://secunia.com/advisories/33398
http://secunia.com/advisories/32165
http://secunia.com/advisories/32219
http://secunia.com/advisories/32371
http://secunia.com/advisories/32372
http://securityreason.com/securityalert/4158
XForce ISS Database: ruby-regex-dos(44688)
http://xforce.iss.net/xforce/xfdb/44688
Common Vulnerability Exposure (CVE) ID: CVE-2008-3655
Bugtraq: 20080831 rPSA-2008-0264-1 ruby (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495884/100/0/threaded
Debian Security Information: DSA-1651 (Google Search)
http://www.debian.org/security/2008/dsa-1651
Debian Security Information: DSA-1652 (Google Search)
http://www.debian.org/security/2008/dsa-1652
http://security.gentoo.org/glsa/glsa-200812-17.xml
BugTraq ID: 30644
http://www.securityfocus.com/bid/30644
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11602
http://www.vupen.com/english/advisories/2008/2334
http://www.securitytracker.com/id?1020656
http://secunia.com/advisories/31697
http://secunia.com/advisories/32255
http://secunia.com/advisories/32256
http://secunia.com/advisories/33178
XForce ISS Database: ruby-safelevel-security-bypass(44369)
http://xforce.iss.net/xforce/xfdb/44369
Common Vulnerability Exposure (CVE) ID: CVE-2008-3656
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9682
http://www.securitytracker.com/id?1020654
XForce ISS Database: ruby-webrick-dos(44371)
http://xforce.iss.net/xforce/xfdb/44371
Common Vulnerability Exposure (CVE) ID: CVE-2008-3657
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9793
http://www.securitytracker.com/id?1020652
XForce ISS Database: ruby-dl-security-bypass(44372)
http://xforce.iss.net/xforce/xfdb/44372
Common Vulnerability Exposure (CVE) ID: CVE-2008-3790
http://www.openwall.com/lists/oss-security/2008/08/25/4
http://www.openwall.com/lists/oss-security/2008/08/26/1
http://www.openwall.com/lists/oss-security/2008/08/26/4
http://groups.google.com/group/comp.lang.ruby/browse_thread/thread/19f69e8a081fc0d1/e138e014b74352ca
BugTraq ID: 30802
http://www.securityfocus.com/bid/30802
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10393
http://www.vupen.com/english/advisories/2008/2483
http://www.vupen.com/english/advisories/2008/2428
http://www.securitytracker.com/id?1020735
http://secunia.com/advisories/31602
XForce ISS Database: ruby-rexml-dos(44628)
http://xforce.iss.net/xforce/xfdb/44628
Common Vulnerability Exposure (CVE) ID: CVE-2009-0161
XForce ISS Database: macos-opensslocsp-weak-security(50592)
http://xforce.iss.net/xforce/xfdb/50592
Common Vulnerability Exposure (CVE) ID: CVE-2009-0162
http://lists.apple.com/archives/security-announce/2009/May/msg00001.html
BugTraq ID: 34925
http://www.securityfocus.com/bid/34925
http://www.securitytracker.com/id?1022206
XForce ISS Database: safari-feedurl-code-execution(50476)
http://xforce.iss.net/xforce/xfdb/50476
Common Vulnerability Exposure (CVE) ID: CVE-2009-0944
BugTraq ID: 34939
http://www.securityfocus.com/bid/34939
Common Vulnerability Exposure (CVE) ID: CVE-2009-0158
Common Vulnerability Exposure (CVE) ID: CVE-2009-1717
Bugtraq: 20090602 TPTI-09-04: Apple Terminal xterm Resize Escape Sequence Memory Corruption Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504031/100/0/threaded
http://dvlabs.tippingpoint.com/advisory/TPTI-09-04
BugTraq ID: 35182
http://www.securityfocus.com/bid/35182
http://securitytracker.com/id?1022322
XForce ISS Database: macos-terminal-bo(50982)
http://xforce.iss.net/xforce/xfdb/50982
Common Vulnerability Exposure (CVE) ID: CVE-2009-0945
Bugtraq: 20090519 ZDI-09-022: Apple Safari Malformed SVGList Parsing Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503594/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-09-022
Debian Security Information: DSA-1950 (Google Search)
http://www.debian.org/security/2009/dsa-1950
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html
http://www.redhat.com/support/errata/RHSA-2009-1130.html
SuSE Security Announcement: SUSE-SR:2011:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://www.ubuntulinux.org/support/documentation/usn/usn-823-1
http://www.ubuntu.com/usn/USN-822-1
http://www.ubuntu.com/usn/USN-857-1
http://www.ubuntu.com/usn/USN-836-1
BugTraq ID: 34924
http://www.securityfocus.com/bid/34924
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11584
http://www.securitytracker.com/id?1022207
http://secunia.com/advisories/35095
http://secunia.com/advisories/35576
http://secunia.com/advisories/35805
http://secunia.com/advisories/36062
http://secunia.com/advisories/36461
http://secunia.com/advisories/37746
http://secunia.com/advisories/36790
http://secunia.com/advisories/43068
http://www.vupen.com/english/advisories/2009/1321
http://www.vupen.com/english/advisories/2011/0212
XForce ISS Database: safari-webkit-svglist-bo(50477)
http://xforce.iss.net/xforce/xfdb/50477
Common Vulnerability Exposure (CVE) ID: CVE-2006-0747
Bugtraq: 20060612 rPSA-2006-0100-1 freetype (Google Search)
http://www.securityfocus.com/archive/1/archive/1/436836/100/0/threaded
Debian Security Information: DSA-1095 (Google Search)
http://www.debian.org/security/2006/dsa-1095
http://www.mandriva.com/security/advisories?name=MDKSA-2006:099
http://www.redhat.com/support/errata/RHSA-2006-0500.html
SGI Security Advisory: 20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
SuSE Security Announcement: SUSE-SA:2006:037 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html
http://www.ubuntulinux.org/support/documentation/usn/usn-291-1
BugTraq ID: 18326
http://www.securityfocus.com/bid/18326
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9508
http://www.vupen.com/english/advisories/2007/0381
http://securitytracker.com/id?1016522
http://secunia.com/advisories/20525
http://secunia.com/advisories/20591
http://secunia.com/advisories/20638
http://secunia.com/advisories/20791
http://secunia.com/advisories/21062
http://secunia.com/advisories/21135
http://secunia.com/advisories/21385
http://secunia.com/advisories/21701
http://secunia.com/advisories/23939
Common Vulnerability Exposure (CVE) ID: CVE-2007-2754
Bugtraq: 20070524 FLEA-2007-0020-1: freetype (Google Search)
http://www.securityfocus.com/archive/1/archive/1/469463/100/200/threaded
Bugtraq: 20070613 FLEA-2007-0025-1: openoffice.org (Google Search)
http://www.securityfocus.com/archive/1/archive/1/471286/30/6180/threaded
http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
Debian Security Information: DSA-1302 (Google Search)
http://www.debian.org/security/2007/dsa-1302
Debian Security Information: DSA-1334 (Google Search)
http://www.debian.org/security/2007/dsa-1334
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml
http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:121
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html
http://www.redhat.com/support/errata/RHSA-2007-0403.html
http://www.redhat.com/support/errata/RHSA-2009-0329.html
http://www.redhat.com/support/errata/RHSA-2009-1062.html
SGI Security Advisory: 20070602-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1
SuSE Security Announcement: SUSE-SA:2007:041 (Google Search)
http://www.novell.com/linux/security/advisories/2007_41_freetype2.html
http://www.trustix.org/errata/2007/0019/
http://www.ubuntu.com/usn/usn-466-1
BugTraq ID: 24074
http://www.securityfocus.com/bid/24074
http://osvdb.org/36509
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11325
http://secunia.com/advisories/35200
http://secunia.com/advisories/35204
http://secunia.com/advisories/35233
http://www.vupen.com/english/advisories/2007/1894
http://www.vupen.com/english/advisories/2007/2229
http://www.vupen.com/english/advisories/2008/0049
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5532
http://www.securitytracker.com/id?1018088
http://secunia.com/advisories/25350
http://secunia.com/advisories/25386
http://secunia.com/advisories/25353
http://secunia.com/advisories/25463
http://secunia.com/advisories/25483
http://secunia.com/advisories/25612
http://secunia.com/advisories/25609
http://secunia.com/advisories/25654
http://secunia.com/advisories/25705
http://secunia.com/advisories/25894
http://secunia.com/advisories/25905
http://secunia.com/advisories/25808
http://secunia.com/advisories/26129
http://secunia.com/advisories/26305
http://secunia.com/advisories/28298
http://secunia.com/advisories/30161
Common Vulnerability Exposure (CVE) ID: CVE-2008-2383
Debian Security Information: DSA-1694 (Google Search)
http://www.debian.org/security/2009/dsa-1694
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00072.html
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00184.html
http://www.redhat.com/support/errata/RHSA-2009-0018.html
http://www.redhat.com/support/errata/RHSA-2009-0019.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-254208-1
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.ubuntulinux.org/support/documentation/usn/usn-703-1
BugTraq ID: 33060
http://www.securityfocus.com/bid/33060
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9317
http://www.securitytracker.com/id?1021522
http://secunia.com/advisories/33318
http://secunia.com/advisories/33419
http://secunia.com/advisories/33568
http://secunia.com/advisories/33418
http://secunia.com/advisories/33397
http://secunia.com/advisories/33820
http://secunia.com/advisories/33388
XForce ISS Database: xterm-decrqss-code-execution(47655)
http://xforce.iss.net/xforce/xfdb/47655
Common Vulnerability Exposure (CVE) ID: CVE-2008-1382
Bugtraq: 20080414 [oCERT-2008-003] libpng zero-length chunks incorrect handling (Google Search)
http://www.securityfocus.com/archive/1/archive/1/490823/100/0/threaded
Bugtraq: 20080429 rPSA-2008-0151-1 libpng (Google Search)
http://www.securityfocus.com/archive/1/archive/1/491424/100/0/threaded
Bugtraq: 20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503912/100/0/threaded
http://www.ocert.org/advisories/ocert-2008-003.html
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Debian Security Information: DSA-1750 (Google Search)
http://www.debian.org/security/2009/dsa-1750
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00721.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00960.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00951.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00033.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00080.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00111.html
http://security.gentoo.org/glsa/glsa-200804-15.xml
http://security.gentoo.org/glsa/glsa-200805-10.xml
http://security.gentoo.org/glsa/glsa-200812-15.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:156
http://www.redhat.com/support/errata/RHSA-2009-0333.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.541247
http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
SuSE Security Announcement: SUSE-SR:2008:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
Cert/CC Advisory: TA08-260A
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
BugTraq ID: 28770
http://www.securityfocus.com/bid/28770
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10326
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6275
http://secunia.com/advisories/34388
http://secunia.com/advisories/35258
http://secunia.com/advisories/35302
http://secunia.com/advisories/35386
http://secunia.com/advisories/34152
http://www.vupen.com/english/advisories/2008/1225/references
http://www.vupen.com/english/advisories/2008/2584
http://www.osvdb.org/44364
http://www.securitytracker.com/id?1019840
http://secunia.com/advisories/29792
http://secunia.com/advisories/29678
http://secunia.com/advisories/29992
http://secunia.com/advisories/29957
http://secunia.com/advisories/30009
http://secunia.com/advisories/30402
http://secunia.com/advisories/30486
http://secunia.com/advisories/31882
http://secunia.com/advisories/30157
http://secunia.com/advisories/30174
http://secunia.com/advisories/33137
http://www.vupen.com/english/advisories/2009/1451
http://www.vupen.com/english/advisories/2009/1462
http://www.vupen.com/english/advisories/2009/1560
XForce ISS Database: libpng-zero-length-code-execution(41800)
http://xforce.iss.net/xforce/xfdb/41800
Common Vulnerability Exposure (CVE) ID: CVE-2009-0040
Bugtraq: 20090312 rPSA-2009-0046-1 libpng (Google Search)
http://www.securityfocus.com/archive/1/archive/1/501767/100/0/threaded
Bugtraq: 20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server (Google Search)
http://www.securityfocus.com/archive/1/archive/1/505990/100/0/threaded
http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com
http://lists.vmware.com/pipermail/security-announce/2009/000062.html
http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
Debian Security Information: DSA-1830 (Google Search)
http://www.debian.org/security/2009/dsa-1830
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html
http://security.gentoo.org/glsa/glsa-200903-28.xml
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:051
http://www.mandriva.com/security/advisories?name=MDVSA-2009:075
http://www.mandriva.com/security/advisories?name=MDVSA-2009:083
http://www.redhat.com/support/errata/RHSA-2009-0315.html
http://www.redhat.com/support/errata/RHSA-2009-0325.html
http://www.redhat.com/support/errata/RHSA-2009-0340.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952
SuSE Security Announcement: SUSE-SA:2009:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html
SuSE Security Announcement: SUSE-SA:2009:023 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html
Cert/CC Advisory: TA09-218A
http://www.us-cert.gov/cas/techalerts/TA09-218A.html
CERT/CC vulnerability note: VU#649212
http://www.kb.cert.org/vuls/id/649212
BugTraq ID: 33827
http://www.securityfocus.com/bid/33827
BugTraq ID: 33990
http://www.securityfocus.com/bid/33990
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10316
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6458
http://secunia.com/advisories/34145
http://secunia.com/advisories/34210
http://secunia.com/advisories/34265
http://secunia.com/advisories/34272
http://secunia.com/advisories/34320
http://secunia.com/advisories/34324
http://secunia.com/advisories/34462
http://secunia.com/advisories/34464
http://secunia.com/advisories/36096
http://secunia.com/advisories/34137
http://secunia.com/advisories/34140
http://secunia.com/advisories/34143
http://www.vupen.com/english/advisories/2009/0469
http://www.vupen.com/english/advisories/2009/0473
http://secunia.com/advisories/33970
http://secunia.com/advisories/33976
http://www.vupen.com/english/advisories/2009/0632
http://www.vupen.com/english/advisories/2009/2172
XForce ISS Database: libpng-pointer-arrays-code-execution(48819)
http://xforce.iss.net/xforce/xfdb/48819
Common Vulnerability Exposure (CVE) ID: CVE-2009-0946
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
Debian Security Information: DSA-1784 (Google Search)
http://www.debian.org/security/2009/dsa-1784
http://security.gentoo.org/glsa/glsa-200905-05.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:243
http://www.redhat.com/support/errata/RHSA-2009-1061.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1
http://www.ubuntu.com/usn/USN-767-1
BugTraq ID: 34550
http://www.securityfocus.com/bid/34550
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10149
http://secunia.com/advisories/34723
http://secunia.com/advisories/34913
http://secunia.com/advisories/34967
http://secunia.com/advisories/35198
http://secunia.com/advisories/35210
http://www.vupen.com/english/advisories/2009/1058
CopyrightCopyright (C) 2010 LSS

Esta es sólo una de 39644 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2014 E-Soft Inc. Todos los derechos reservados.