English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75096 CVE descriptions
and 39644 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.102025
Category:Mac OS X Local Security Checks
Title:Mac OS X Security Update 2008-007
Summary:Checks for existence of Mac OS X Security Update 2008-007
Description:
Overview:
The remote host is missing Security Update 2008-007.
One or more of the following components are affected:

Apache
Certificates
ClamAV
ColorSync
CUPS
Finder
launchd
libxslt
MySQL Server
Networking
PHP
Postfix
PSNormalizer
QuickLook
rlogin
Script Editor
Single Sign-On
Tomcat
vim
Weblog

Solution:
Update your Mac OS X operating system.

For more information see:
http://support.apple.com/kb/HT3216
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-6420
Bugtraq: 20080110 SecurityReason - Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/486169/100/0/threaded
Bugtraq: 20080729 rPSA-2008-0236-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/494858/100/0/threaded
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
http://security.gentoo.org/glsa/glsa-200807-06.xml
HPdes Security Advisory: HPSBUX02401
http://marc.info/?l=bugtraq&m=123376588623823&w=2
HPdes Security Advisory: SSRT090005
http://www.redhat.com/support/errata/RHSA-2008-0966.html
SuSE Security Announcement: SUSE-SR:2008:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html
http://www.ubuntu.com/usn/USN-731-1
BugTraq ID: 27236
http://www.securityfocus.com/bid/27236
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8371
http://secunia.com/advisories/34219
http://www.vupen.com/english/advisories/2008/2780
http://www.vupen.com/english/advisories/2009/0320
http://secunia.com/advisories/31026
http://secunia.com/advisories/32222
http://secunia.com/advisories/33797
http://securityreason.com/securityalert/3523
Common Vulnerability Exposure (CVE) ID: CVE-2008-1678
http://marc.info/?l=openssl-dev&m=121060672602371&w=2
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:124
http://www.redhat.com/support/errata/RHSA-2009-1075.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049
BugTraq ID: 31692
http://www.securityfocus.com/bid/31692
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9754
http://secunia.com/advisories/35264
http://secunia.com/advisories/38761
http://secunia.com/advisories/42724
http://secunia.com/advisories/42733
http://secunia.com/advisories/44183
http://secunia.com/advisories/31416
http://securityreason.com/securityalert/3981
XForce ISS Database: openssl-libssl-dos(43948)
http://xforce.iss.net/xforce/xfdb/43948
Common Vulnerability Exposure (CVE) ID: CVE-2008-2364
Bugtraq: 20081122 rPSA-2008-0328-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498567/100/0/threaded
AIX APAR: PK67579
http://www-1.ibm.com/support/docview.wss?uid=swg1PK67579
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00153.html
HPdes Security Advisory: HPSBUX02365
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
HPdes Security Advisory: SSRT080118
HPdes Security Advisory: HPSBUX02465
http://marc.info/?l=bugtraq&m=125631037611762&w=2
HPdes Security Advisory: SSRT090192
http://www.mandriva.com/security/advisories?name=MDVSA-2008:195
http://www.mandriva.com/security/advisories?name=MDVSA-2008:237
RedHat Security Advisories: RHSA-2008:0967
http://rhn.redhat.com/errata/RHSA-2008-0967.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1
SuSE Security Announcement: SUSE-SR:2009:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
SuSE Security Announcement: SUSE-SR:2009:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
BugTraq ID: 29653
http://www.securityfocus.com/bid/29653
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6084
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11713
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9577
http://secunia.com/advisories/34259
http://secunia.com/advisories/34418
http://www.vupen.com/english/advisories/2008/1798
http://www.securitytracker.com/id?1020267
http://secunia.com/advisories/30621
http://secunia.com/advisories/31404
http://secunia.com/advisories/31651
http://secunia.com/advisories/31904
http://secunia.com/advisories/32685
http://secunia.com/advisories/33156
http://secunia.com/advisories/32838
XForce ISS Database: apache-modproxy-module-dos(42987)
http://xforce.iss.net/xforce/xfdb/42987
Common Vulnerability Exposure (CVE) ID: CVE-2008-1389
http://int21.de/cve/CVE-2008-1389-clamav-chd.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html
http://security.gentoo.org/glsa/glsa-200809-18.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:189
SuSE Security Announcement: SUSE-SR:2008:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
BugTraq ID: 30994
http://www.securityfocus.com/bid/30994
http://www.vupen.com/english/advisories/2008/2484
http://www.vupen.com/english/advisories/2008/2564
http://www.securitytracker.com/id?1020805
http://secunia.com/advisories/31725
http://secunia.com/advisories/32030
http://secunia.com/advisories/31906
http://secunia.com/advisories/32699
http://secunia.com/advisories/31982
Common Vulnerability Exposure (CVE) ID: CVE-2008-3912
http://www.openwall.com/lists/oss-security/2008/09/03/2
http://www.openwall.com/lists/oss-security/2008/09/04/13
https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1141
Debian Security Information: DSA-1660 (Google Search)
http://www.debian.org/security/2008/dsa-1660
BugTraq ID: 31051
http://www.securityfocus.com/bid/31051
http://secunia.com/advisories/32424
http://www.securitytracker.com/id?1020828
XForce ISS Database: clamav-libclamav-dos(45056)
http://xforce.iss.net/xforce/xfdb/45056
Common Vulnerability Exposure (CVE) ID: CVE-2008-3913
XForce ISS Database: clamav-manager-dos(45057)
http://xforce.iss.net/xforce/xfdb/45057
Common Vulnerability Exposure (CVE) ID: CVE-2008-3914
XForce ISS Database: clamav-multiple-unspecified(45058)
http://xforce.iss.net/xforce/xfdb/45058
Common Vulnerability Exposure (CVE) ID: CVE-2008-3642
http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
BugTraq ID: 31715
http://www.securityfocus.com/bid/31715
http://secunia.com/advisories/32706
http://www.securitytracker.com/id?1021023
XForce ISS Database: macosx-colorsync-bo(45778)
http://xforce.iss.net/xforce/xfdb/45778
Common Vulnerability Exposure (CVE) ID: CVE-2008-3641
Bugtraq: 20081010 ZDI-08-067: Apple CUPS 1.3.7 (HP-GL/2 filter) Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497221/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-08-067
Debian Security Information: DSA-1656 (Google Search)
http://www.debian.org/security/2008/dsa-1656
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00331.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00380.html
http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:211
http://www.redhat.com/support/errata/RHSA-2008-0937.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-261088-1
SuSE Security Announcement: SUSE-SR:2008:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.ubuntulinux.org/support/documentation/usn/usn-656-1
BugTraq ID: 31688
http://www.securityfocus.com/bid/31688
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9666
http://secunia.com/advisories/33085
http://secunia.com/advisories/33111
http://secunia.com/advisories/32331
http://www.vupen.com/english/advisories/2008/2782
http://www.vupen.com/english/advisories/2008/3401
http://www.securitytracker.com/id?1021031
http://secunia.com/advisories/32084
http://secunia.com/advisories/32226
http://secunia.com/advisories/32316
http://secunia.com/advisories/32284
http://secunia.com/advisories/32292
http://secunia.com/advisories/33568
http://www.vupen.com/english/advisories/2009/1568
XForce ISS Database: cups-hpgl-code-execution(45779)
http://xforce.iss.net/xforce/xfdb/45779
Common Vulnerability Exposure (CVE) ID: CVE-2008-3643
BugTraq ID: 31720
http://www.securityfocus.com/bid/31720
http://www.securitytracker.com/id?1021024
XForce ISS Database: macosx-finder-dos(45780)
http://xforce.iss.net/xforce/xfdb/45780
Common Vulnerability Exposure (CVE) ID: CVE-2008-1767
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
Debian Security Information: DSA-1589 (Google Search)
http://www.debian.org/security/2008/dsa-1589
http://security.gentoo.org/glsa/glsa-200806-02.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:151
http://www.redhat.com/support/errata/RHSA-2008-0287.html
SuSE Security Announcement: SUSE-SR:2008:013 (Google Search)
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.ubuntu.com/usn/usn-633-1
BugTraq ID: 29312
http://www.securityfocus.com/bid/29312
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9785
http://www.vupen.com/english/advisories/2008/1580/references
http://www.vupen.com/english/advisories/2008/2094/references
http://www.securitytracker.com/id?1020071
http://secunia.com/advisories/30315
http://secunia.com/advisories/30323
http://secunia.com/advisories/30393
http://secunia.com/advisories/30521
http://secunia.com/advisories/30717
http://secunia.com/advisories/31074
http://secunia.com/advisories/31363
XForce ISS Database: libxslt-xsl-bo(42560)
http://xforce.iss.net/xforce/xfdb/42560
Common Vulnerability Exposure (CVE) ID: CVE-2007-2691
Bugtraq: 20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server (Google Search)
http://www.securityfocus.com/archive/1/archive/1/473874/100/0/threaded
http://lists.mysql.com/announce/470
http://bugs.mysql.com/bug.php?id=27515
Debian Security Information: DSA-1413 (Google Search)
http://www.debian.org/security/2007/dsa-1413
http://www.mandriva.com/security/advisories?name=MDKSA-2007:139
http://www.redhat.com/support/errata/RHSA-2007-0894.html
http://www.redhat.com/support/errata/RHSA-2008-0768.html
http://www.redhat.com/support/errata/RHSA-2008-0364.html
SuSE Security Announcement: SUSE-SR:2008:003 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
http://www.ubuntulinux.org/support/documentation/usn/usn-528-1
BugTraq ID: 24016
http://www.securityfocus.com/bid/24016
http://osvdb.org/34766
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9559
http://secunia.com/advisories/30351
http://www.vupen.com/english/advisories/2007/1804
http://www.securitytracker.com/id?1018069
http://secunia.com/advisories/25301
http://secunia.com/advisories/25946
http://secunia.com/advisories/26073
http://secunia.com/advisories/27155
http://secunia.com/advisories/26430
http://secunia.com/advisories/27823
http://secunia.com/advisories/28838
http://secunia.com/advisories/31226
XForce ISS Database: mysql-renametable-weak-security(34347)
http://xforce.iss.net/xforce/xfdb/34347
Common Vulnerability Exposure (CVE) ID: CVE-2007-5969
Bugtraq: 20080117 rPSA-2008-0018-1 mysql mysql-bench mysql-server (Google Search)
http://www.securityfocus.com/archive/1/archive/1/486477/100/0/threaded
http://lists.mysql.com/announce/495
Debian Security Information: DSA-1451 (Google Search)
http://www.debian.org/security/2008/dsa-1451
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html
http://security.gentoo.org/glsa/glsa-200804-04.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:243
http://www.redhat.com/support/errata/RHSA-2007-1155.html
http://www.redhat.com/support/errata/RHSA-2007-1157.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959
http://www.ubuntulinux.org/support/documentation/usn/usn-559-1
BugTraq ID: 26765
http://www.securityfocus.com/bid/26765
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10509
http://www.vupen.com/english/advisories/2007/4142
http://www.vupen.com/english/advisories/2007/4198
http://www.vupen.com/english/advisories/2008/0560/references
http://www.vupen.com/english/advisories/2008/1000/references
http://www.securitytracker.com/id?1019060
http://secunia.com/advisories/27981
http://secunia.com/advisories/28040
http://secunia.com/advisories/28063
http://secunia.com/advisories/28025
http://secunia.com/advisories/28108
http://secunia.com/advisories/28099
http://secunia.com/advisories/28128
http://secunia.com/advisories/28343
http://secunia.com/advisories/28559
http://secunia.com/advisories/29706
Common Vulnerability Exposure (CVE) ID: CVE-2008-0226
Bugtraq: 20080104 Multiple vulnerabilities in yaSSL 1.7.5 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/485810/100/0/threaded
Bugtraq: 20080104 Pre-auth buffer-overflow in mySQL through yaSSL (Google Search)
http://www.securityfocus.com/archive/1/archive/1/485811/100/0/threaded
Debian Security Information: DSA-1478 (Google Search)
http://www.debian.org/security/2008/dsa-1478
http://www.mandriva.com/security/advisories?name=MDVSA-2008:150
http://www.ubuntu.com/usn/usn-588-1
BugTraq ID: 27140
http://www.securityfocus.com/bid/27140
http://secunia.com/advisories/28324
http://secunia.com/advisories/28419
http://secunia.com/advisories/28597
http://secunia.com/advisories/29443
http://securityreason.com/securityalert/3531
XForce ISS Database: yassl-inputbufferoperator-bo(39431)
http://xforce.iss.net/xforce/xfdb/39431
XForce ISS Database: yassl-processoldclienthello-bo(39429)
http://xforce.iss.net/xforce/xfdb/39429
Common Vulnerability Exposure (CVE) ID: CVE-2008-0227
XForce ISS Database: yassl-hashwithtransformupdate-dos(39433)
http://xforce.iss.net/xforce/xfdb/39433
Common Vulnerability Exposure (CVE) ID: CVE-2008-2079
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
Debian Security Information: DSA-1608 (Google Search)
http://www.debian.org/security/2008/dsa-1608
http://www.mandriva.com/security/advisories?name=MDVSA-2008:149
http://www.redhat.com/support/errata/RHSA-2008-0505.html
http://www.redhat.com/support/errata/RHSA-2008-0510.html
http://www.redhat.com/support/errata/RHSA-2009-1289.html
SuSE Security Announcement: SUSE-SR:2008:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
http://www.ubuntu.com/usn/USN-671-1
BugTraq ID: 29106
http://www.securityfocus.com/bid/29106
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10133
http://secunia.com/advisories/36701
http://secunia.com/advisories/32769
http://secunia.com/advisories/36566
http://www.vupen.com/english/advisories/2008/1472/references
http://www.securitytracker.com/id?1019995
http://secunia.com/advisories/30134
http://secunia.com/advisories/31066
http://secunia.com/advisories/31687
XForce ISS Database: mysql-myisam-security-bypass(42267)
http://xforce.iss.net/xforce/xfdb/42267
Common Vulnerability Exposure (CVE) ID: CVE-2008-3645
BugTraq ID: 31711
http://www.securityfocus.com/bid/31711
http://www.securitytracker.com/id?1021025
XForce ISS Database: macosx-eapolcontroller-bo(45781)
http://xforce.iss.net/xforce/xfdb/45781
Common Vulnerability Exposure (CVE) ID: CVE-2007-4850
http://securityreason.com/achievement_securityalert/51
Bugtraq: 20080122 PHP 5.2.5 cURL safe_mode bypass (Google Search)
http://www.securityfocus.com/archive/1/archive/1/486856/100/0/threaded
Bugtraq: 20080527 rPSA-2008-0178-1 php php-mysql php-pgsql (Google Search)
http://www.securityfocus.com/archive/1/archive/1/492671/100/0/threaded
http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html
http://www.openwall.com/lists/oss-security/2008/05/02/2
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
http://www.ubuntu.com/usn/usn-628-1
BugTraq ID: 27413
http://www.securityfocus.com/bid/27413
BugTraq ID: 29009
http://www.securityfocus.com/bid/29009
http://www.vupen.com/english/advisories/2008/1412
http://www.vupen.com/english/advisories/2008/2268
http://secunia.com/advisories/30048
http://secunia.com/advisories/30411
http://secunia.com/advisories/31200
http://secunia.com/advisories/31326
http://securityreason.com/securityalert/3562
XForce ISS Database: php-curlinit-security-bypass(39852)
http://xforce.iss.net/xforce/xfdb/39852
XForce ISS Database: php-safemode-directive-security-bypass(42134)
http://xforce.iss.net/xforce/xfdb/42134
Common Vulnerability Exposure (CVE) ID: CVE-2008-0674
Bugtraq: 20080228 rPSA-2008-0086-1 pcre (Google Search)
http://www.securityfocus.com/archive/1/archive/1/488927/100/0/threaded
Bugtraq: 20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/492535/100/0/threaded
http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
Debian Security Information: DSA-1499 (Google Search)
http://www.debian.org/security/2008/dsa-1499
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00371.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00632.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html
http://security.gentoo.org/glsa/glsa-200803-24.xml
http://security.gentoo.org/glsa/glsa-200811-05.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:053
SuSE Security Announcement: SUSE-SR:2008:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
http://www.ubuntulinux.org/support/documentation/usn/usn-581-1
Cert/CC Advisory: TA09-218A
http://www.us-cert.gov/cas/techalerts/TA09-218A.html
BugTraq ID: 27786
http://www.securityfocus.com/bid/27786
http://www.securitytracker.com/id?1022674
http://secunia.com/advisories/36096
http://secunia.com/advisories/32746
http://www.vupen.com/english/advisories/2008/0570
http://www.vupen.com/english/advisories/2008/0592
http://secunia.com/advisories/28923
http://secunia.com/advisories/28960
http://secunia.com/advisories/28985
http://secunia.com/advisories/28996
http://secunia.com/advisories/28957
http://secunia.com/advisories/29027
http://secunia.com/advisories/29048
http://secunia.com/advisories/29175
http://secunia.com/advisories/29267
http://secunia.com/advisories/29282
http://secunia.com/advisories/30345
http://www.vupen.com/english/advisories/2009/2172
XForce ISS Database: pcre-characterclass-bo(40505)
http://xforce.iss.net/xforce/xfdb/40505
Common Vulnerability Exposure (CVE) ID: CVE-2008-2371
Bugtraq: 20081027 rPSA-2008-0305-1 pcre (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497828/100/0/threaded
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
Debian Security Information: DSA-1602 (Google Search)
http://www.debian.org/security/2008/dsa-1602
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html
http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml
HPdes Security Advisory: HPSBUX02431
http://marc.info/?l=bugtraq&m=124654546101607&w=2
HPdes Security Advisory: SSRT090085
http://www.mandriva.com/security/advisories?name=MDVSA-2008:147
SuSE Security Announcement: SUSE-SR:2008:014 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
http://www.ubuntu.com/usn/usn-624-1
http://ubuntu.com/usn/usn-624-2
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
BugTraq ID: 30087
http://www.securityfocus.com/bid/30087
http://secunia.com/advisories/35074
http://secunia.com/advisories/35650
http://secunia.com/advisories/39300
http://www.vupen.com/english/advisories/2008/2005
http://www.vupen.com/english/advisories/2008/2006
http://secunia.com/advisories/30916
http://secunia.com/advisories/30944
http://secunia.com/advisories/30958
http://secunia.com/advisories/30961
http://secunia.com/advisories/30945
http://secunia.com/advisories/30972
http://secunia.com/advisories/30967
http://secunia.com/advisories/30990
http://secunia.com/advisories/32454
http://www.vupen.com/english/advisories/2008/2336
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2010/0833
Common Vulnerability Exposure (CVE) ID: CVE-2008-3646
BugTraq ID: 31721
http://www.securityfocus.com/bid/31721
XForce ISS Database: macosx-postfix-configfile-weak-security(45876)
http://xforce.iss.net/xforce/xfdb/45876
Common Vulnerability Exposure (CVE) ID: CVE-2008-3647
BugTraq ID: 31719
http://www.securityfocus.com/bid/31719
http://www.securitytracker.com/id?1021026
XForce ISS Database: macosx-psnormalizer-bo(45783)
http://xforce.iss.net/xforce/xfdb/45783
Common Vulnerability Exposure (CVE) ID: CVE-2008-4211
http://lists.apple.com/archives/security-announce/2008/Nov/msg00002.html
BugTraq ID: 31707
http://www.securityfocus.com/bid/31707
http://www.vupen.com/english/advisories/2008/3232
http://www.securitytracker.com/id?1021027
http://secunia.com/advisories/32756
XForce ISS Database: macosx-quicklook2-code-execution(45784)
http://xforce.iss.net/xforce/xfdb/45784
Common Vulnerability Exposure (CVE) ID: CVE-2008-4212
BugTraq ID: 31708
http://www.securityfocus.com/bid/31708
http://www.securitytracker.com/id?1021028
XForce ISS Database: macosx-rlogin-weak-security(45785)
http://xforce.iss.net/xforce/xfdb/45785
Common Vulnerability Exposure (CVE) ID: CVE-2008-4214
BugTraq ID: 31716
http://www.securityfocus.com/bid/31716
http://www.securitytracker.com/id?1021029
XForce ISS Database: macosx-scripteditor-symlink(45786)
http://xforce.iss.net/xforce/xfdb/45786
Common Vulnerability Exposure (CVE) ID: CVE-2007-6286
Bugtraq: 20080208 [SECURITY] CVE-2007-6286: Tomcat duplicate request processing vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/487823/100/0/threaded
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html
http://security.gentoo.org/glsa/glsa-200804-10.xml
HPdes Security Advisory: HPSBST02955
http://marc.info/?l=bugtraq&m=139344343412337&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
SuSE Security Announcement: SUSE-SR:2009:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
http://secunia.com/advisories/37460
http://secunia.com/advisories/57126
http://www.vupen.com/english/advisories/2008/0488
http://www.vupen.com/english/advisories/2008/1856/references
http://secunia.com/advisories/28878
http://secunia.com/advisories/28915
http://secunia.com/advisories/29711
http://secunia.com/advisories/30676
http://securityreason.com/securityalert/3637
http://www.vupen.com/english/advisories/2009/3316
Common Vulnerability Exposure (CVE) ID: CVE-2008-0002
Bugtraq: 20080208 CVE-2008-0002: Tomcat information disclosure vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/487812/100/0/threaded
BugTraq ID: 27703
http://www.securityfocus.com/bid/27703
http://secunia.com/advisories/28834
http://securityreason.com/securityalert/3638
Common Vulnerability Exposure (CVE) ID: CVE-2008-1232
Bugtraq: 20080801 [CVE-2008-1232] Apache Tomcat XSS vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495021/100/0/threaded
Bugtraq: 20090616 CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504351/100/0/threaded
Bugtraq: 20090806 CA20090806-02: Security Notice for Unicenter Asset Portfolio Management, Unicenter Desktop and Server Management, Unicenter Patch Management (Google Search)
http://www.securityfocus.com/archive/1/archive/1/505556/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:188
http://www.redhat.com/support/errata/RHSA-2008-0648.html
http://www.redhat.com/support/errata/RHSA-2008-0862.html
http://www.redhat.com/support/errata/RHSA-2008-0864.html
BugTraq ID: 30496
http://www.securityfocus.com/bid/30496
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5985
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11181
http://secunia.com/advisories/33999
http://secunia.com/advisories/34013
http://secunia.com/advisories/35474
http://secunia.com/advisories/36108
http://www.vupen.com/english/advisories/2008/2305
http://www.vupen.com/english/advisories/2008/2823
http://www.securitytracker.com/id?1020622
http://secunia.com/advisories/31379
http://secunia.com/advisories/31381
http://secunia.com/advisories/31639
http://secunia.com/advisories/31891
http://secunia.com/advisories/31865
http://secunia.com/advisories/32120
http://secunia.com/advisories/32266
http://securityreason.com/securityalert/4098
http://www.vupen.com/english/advisories/2009/0503
http://www.vupen.com/english/advisories/2009/1609
http://www.vupen.com/english/advisories/2009/2194
XForce ISS Database: tomcat-httpservletresponse-xss(44155)
http://xforce.iss.net/xforce/xfdb/44155
Common Vulnerability Exposure (CVE) ID: CVE-2008-1947
Bugtraq: 20080602 [SECURITY] CVE-2008-1947: Tomcat host-manager XSS vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/492958/100/0/threaded
http://marc.info/?l=tomcat-user&m=121244319501278&w=2
Debian Security Information: DSA-1593 (Google Search)
http://www.debian.org/security/2008/dsa-1593
BugTraq ID: 29502
http://www.securityfocus.com/bid/29502
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6009
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11534
http://www.vupen.com/english/advisories/2008/1725
http://www.securitytracker.com/id?1020624
http://secunia.com/advisories/30500
http://secunia.com/advisories/30592
XForce ISS Database: apache-tomcat-hostmanager-xss(42816)
http://xforce.iss.net/xforce/xfdb/42816
Common Vulnerability Exposure (CVE) ID: CVE-2008-2370
Bugtraq: 20080801 [CVE-2008-2370] Apache Tomcat information disclosure vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495022/100/0/threaded
http://marc.info/?l=apache-announce&m=124972618803216&w=2
http://mail-archives.apache.org/mod_mbox/ode-user/200908.mbox/%3Cfbdc6a970908072141w20a7a9d9ka1f896ad8073dffb@mail.gmail.com%3E
BugTraq ID: 30494
http://www.securityfocus.com/bid/30494
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5876
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10577
http://secunia.com/advisories/35393
http://secunia.com/advisories/36249
http://www.securitytracker.com/id?1020623
http://securityreason.com/securityalert/4099
http://www.vupen.com/english/advisories/2009/1535
http://www.vupen.com/english/advisories/2009/2215
XForce ISS Database: tomcat-requestdispatcher-info-disclosure(44156)
http://xforce.iss.net/xforce/xfdb/44156
Common Vulnerability Exposure (CVE) ID: CVE-2008-2938
Bugtraq: 20080811 Apache Tomcat <= 6.0.18 UTF8 Directory Traversal Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495318/100/0/threaded
Bugtraq: 20091107 ToutVirtual VirtualIQ Multiple Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507729/100/0/threaded
http://www.milw0rm.com/exploits/6229
http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt
CERT/CC vulnerability note: VU#343355
http://www.kb.cert.org/vuls/id/343355
BugTraq ID: 30633
http://www.securityfocus.com/bid/30633
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10587
http://secunia.com/advisories/37297
http://www.vupen.com/english/advisories/2008/2343
http://www.securitytracker.com/id?1020665
http://securityreason.com/securityalert/4148
XForce ISS Database: tomcat-allowlinking-utf8-directory-traversal(44411)
http://xforce.iss.net/xforce/xfdb/44411
Common Vulnerability Exposure (CVE) ID: CVE-2007-5333
Bugtraq: 20080208 [SECURITY] CVE-2007-5333: Tomcat Cookie handling vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/archive/1/487822/100/0/threaded
AIX APAR: IZ20991
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20991
AIX APAR: IZ20133
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20133
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:018
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
http://jvn.jp/jp/JVN%2309470767/index.html
BugTraq ID: 27706
http://www.securityfocus.com/bid/27706
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11177
http://www.vupen.com/english/advisories/2008/1981/references
http://www.vupen.com/english/advisories/2008/2690
http://secunia.com/advisories/28884
http://secunia.com/advisories/30802
http://secunia.com/advisories/32036
http://secunia.com/advisories/33330
http://securityreason.com/securityalert/3636
Common Vulnerability Exposure (CVE) ID: CVE-2007-5342
Bugtraq: 20071223 [CVE-2007-5342] Apache Tomcat's default security policy is too open (Google Search)
http://www.securityfocus.com/archive/1/archive/1/485481/100/0/threaded
http://svn.apache.org/viewvc?view=rev&revision=606594
Debian Security Information: DSA-1447 (Google Search)
http://www.debian.org/security/2008/dsa-1447
http://www.redhat.com/support/errata/RHSA-2008-0042.html
http://www.redhat.com/support/errata/RHSA-2008-0195.html
http://www.redhat.com/support/errata/RHSA-2008-0831.html
http://www.redhat.com/support/errata/RHSA-2008-0832.html
http://www.redhat.com/support/errata/RHSA-2008-0833.html
http://www.redhat.com/support/errata/RHSA-2008-0834.html
BugTraq ID: 27006
http://www.securityfocus.com/bid/27006
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10417
http://www.vupen.com/english/advisories/2008/0013
http://osvdb.org/39833
http://secunia.com/advisories/28274
http://secunia.com/advisories/28317
http://secunia.com/advisories/29313
http://securityreason.com/securityalert/3485
XForce ISS Database: apache-juli-logging-weak-security(39201)
http://xforce.iss.net/xforce/xfdb/39201
Common Vulnerability Exposure (CVE) ID: CVE-2007-5461
http://marc.info/?l=full-disclosure&m=119239530508382
http://www.milw0rm.com/exploits/4530
http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705@apache.org%3E
http://issues.apache.org/jira/browse/GERONIMO-3549
Debian Security Information: DSA-1453 (Google Search)
http://www.debian.org/security/2008/dsa-1453
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
http://www.redhat.com/support/errata/RHSA-2008-0261.html
RedHat Security Advisories: RHSA-2008:0630
http://rhn.redhat.com/errata/RHSA-2008-0630.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
SuSE Security Announcement: SUSE-SR:2008:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
BugTraq ID: 26070
http://www.securityfocus.com/bid/26070
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9202
http://www.vupen.com/english/advisories/2007/3622
http://www.vupen.com/english/advisories/2007/3671
http://www.vupen.com/english/advisories/2007/3674
http://www.vupen.com/english/advisories/2008/1979/references
http://www.securitytracker.com/id?1018864
http://secunia.com/advisories/27398
http://secunia.com/advisories/27446
http://secunia.com/advisories/27481
http://secunia.com/advisories/27727
http://secunia.com/advisories/28361
http://secunia.com/advisories/29242
http://secunia.com/advisories/30908
http://secunia.com/advisories/30899
http://secunia.com/advisories/31493
XForce ISS Database: apache-tomcat-webdav-dir-traversal(37243)
http://xforce.iss.net/xforce/xfdb/37243
Common Vulnerability Exposure (CVE) ID: CVE-2008-2712
Bugtraq: 20080613 Collection of Vulnerabilities in Fully Patched Vim 7.1 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/493352/100/0/threaded
Bugtraq: 20080701 Re: Collection of Vulnerabilities in Fully Patched Vim 7.1 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/493353/100/0/threaded
Bugtraq: 20080811 rPSA-2008-0247-1 gvim vim vim-minimal (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495319/100/0/threaded
http://marc.info/?l=bugtraq&m=121494431426308&w=2
Bugtraq: 20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502322/100/0/threaded
http://www.rdancer.org/vulnerablevim.html
http://www.openwall.com/lists/oss-security/2008/06/16/2
http://www.openwall.com/lists/oss-security/2008/10/15/1
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.redhat.com/support/errata/RHSA-2008-0617.html
http://www.redhat.com/support/errata/RHSA-2008-0580.html
http://www.redhat.com/support/errata/RHSA-2008-0618.html
http://www.ubuntu.com/usn/USN-712-1
BugTraq ID: 29715
http://www.securityfocus.com/bid/29715
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11109
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6238
http://secunia.com/advisories/32858
http://secunia.com/advisories/32864
http://www.vupen.com/english/advisories/2008/1851/references
http://www.vupen.com/english/advisories/2009/0033
http://www.securitytracker.com/id?1020293
http://secunia.com/advisories/30731
http://secunia.com/advisories/33410
http://securityreason.com/securityalert/3951
http://www.vupen.com/english/advisories/2009/0904
XForce ISS Database: vim-scripts-command-execution(43083)
http://xforce.iss.net/xforce/xfdb/43083
Common Vulnerability Exposure (CVE) ID: CVE-2008-4101
Bugtraq: 20080822 Vim: Arbitrary Code Execution in Commands: K, Control-], g] (Google Search)
http://www.securityfocus.com/archive/1/495662
Bugtraq: 20080825 RE: Arbitrary Code Execution in Commands: K, Control-], g] (Google Search)
http://www.securityfocus.com/archive/1/495703
http://www.openwall.com/lists/oss-security/2008/09/11/4
http://www.openwall.com/lists/oss-security/2008/09/11/3
http://www.openwall.com/lists/oss-security/2008/09/16/5
http://www.openwall.com/lists/oss-security/2008/09/16/6
http://ftp.vim.org/pub/vim/patches/7.2/7.2.010
http://groups.google.com/group/vim_dev/msg/9290f26f9bc11b33
http://groups.google.com/group/vim_dev/attach/9290f26f9bc11b33/K-arbitrary-command-execution.patch.v3?part=2
http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2
http://groups.google.com/group/vim_dev/browse_thread/thread/1434d0812b5c817e/6ad2d5b50a96668e
http://www.rdancer.org/vulnerablevim-K.html
BugTraq ID: 30795
http://www.securityfocus.com/bid/30795
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10894
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5812
http://secunia.com/advisories/31592
XForce ISS Database: vim-normal-command-execution(44626)
http://xforce.iss.net/xforce/xfdb/44626
Common Vulnerability Exposure (CVE) ID: CVE-2008-3432
http://www.openwall.com/lists/oss-security/2008/07/15/4
http://www.openwall.com/lists/oss-security/2008/08/01/1
BugTraq ID: 30648
http://www.securityfocus.com/bid/30648
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11203
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5987
XForce ISS Database: vim-mchexpandwildcards-bo(44722)
http://xforce.iss.net/xforce/xfdb/44722
Common Vulnerability Exposure (CVE) ID: CVE-2008-3294
Bugtraq: 20080717 Vim: Insecure Temporary File Creation During Build: Arbitrary Code Execution (Google Search)
http://www.securityfocus.com/archive/1/archive/1/494532/100/0/threaded
Bugtraq: 20080718 Re: Vim: Insecure Temporary File Creation During Build: Arbitrary Code Execution (Google Search)
http://www.securityfocus.com/archive/1/archive/1/494535/100/0/threaded
Bugtraq: 20080725 Re: [Full-disclosure] Vim: Insecure Temporary File Creation During Build: Arbitrary Code Execution (Google Search)
http://www.securityfocus.com/archive/1/archive/1/494736/100/0/threaded
http://seclists.org/fulldisclosure/2008/Jul/0312.html
http://www.vupen.com/english/advisories/2008/2146/references
http://secunia.com/advisories/31159
Common Vulnerability Exposure (CVE) ID: CVE-2008-4215
BugTraq ID: 31718
http://www.securityfocus.com/bid/31718
http://www.securitytracker.com/id?1021030
XForce ISS Database: macosx-weblog-weak-security(45787)
http://xforce.iss.net/xforce/xfdb/45787
CopyrightCopyright (C) 2010 LSS

This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.